6.8
CVSSv2

CVE-2016-8332

Published: 28/10/2016 Updated: 19/04/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution when parsing a crafted image. An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library. A specially crafted jpeg2000 file can cause an out of bound heap write resulting in heap corruption leading to arbitrary code execution. For a successful attack, the target user needs to open a malicious jpeg2000 file. The jpeg2000 image file format is mostly used for embedding images inside PDF documents and the OpenJpeg library is used by a number of popular PDF renderers making PDF documents a likely attack vector.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

uclouvain openjpeg 2.1.1

Vendor Advisories

Multiple vulnerabilities in OpenJPEG, a JPEG 2000 image compression / decompression library, may result in denial of service or the execution of arbitrary code if a malformed JPEG 2000 file is processed For the stable distribution (jessie), these problems have been fixed in version 210-2+deb8u2 For the unstable distribution (sid), these problem ...
A buffer overflow in OpenJPEG 211 causes arbitrary code execution when parsing a crafted image An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library A specially crafted jpeg2000 file can cause an out of bound heap write resulting in heap corruption leading to arbitrary ...

Github Repositories

jp2k Rust bindings to OpenJPEG Supports loading JPEG2000 images into image::DynamicImageRust Forked from framagitorg/leoschwarz/jpeg2000-rust before its GPL-v3 relicensing, with some additional features: Specify decoding area and quality layers in addition to reduction factor Improved OpenJPEG -> DynamicImage loading process Get basic metadata from JPEG2000 he

Recent Articles

Let's not meet up with JPEG 2000 – researchers find security hole in image codec
The Register • Shaun Nichols in San Francisco • 04 Oct 2016

Won't it be strange when we're all fully pwned?

Researchers are warning about a newly discovered security vulnerability in a popular open-source JPEG 2000 parser that could let corrupted image files trigger remote code execution. Cisco-owned security firm Talos warns that by embedding a malformed image file into a web page, PDF file, or email message, an attacker could gain control over the targeted system simply by the user loading the page or message in a vulnerable application. The flaw itself (designated CVE-2016-8332) involves the mishan...