CVE-2016-8332
Publication date 28 October 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution when parsing a crafted image. An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library. A specially crafted jpeg2000 file can cause an out of bound heap write resulting in heap corruption leading to arbitrary code execution. For a successful attack, the target user needs to open a malicious jpeg2000 file. The jpeg2000 image file format is mostly used for embedding images inside PDF documents and the OpenJpeg library is used by a number of popular PDF renderers making PDF documents a likely attack vector.
Status
Package | Ubuntu Release | Status |
---|---|---|
openjpeg | 16.04 LTS xenial |
Not affected
|
14.04 LTS trusty |
Not affected
|
|
openjpeg2 | 16.04 LTS xenial |
Fixed 2.1.0-2.1ubuntu0.1
|
14.04 LTS trusty | Not in release | |
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |