9.8
CVSSv3

CVE-2017-17479

Published: 08/12/2017 Updated: 29/11/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In OpenJPEG 2.3.0, a stack-based buffer overflow exists in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

uclouvain openjpeg 2.3.0

Vendor Advisories

Debian Bug report logs - #884738 openjpeg2: CVE-2017-17480: stack-based buffer overflow in pgxtovolume function in jp3d/convertc Package: src:openjpeg2; Maintainer for src:openjpeg2 is Debian PhotoTools Maintainers <pkg-phototools-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> D ...
In OpenJPEG 230, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convertc The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution ...