6.8
CVSSv2

CVE-2018-20847

Published: 26/06/2019 Updated: 27/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG up to and including 2.3.0 can lead to an integer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

uclouvain openjpeg

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #931294 openjpeg2: CVE-2018-20847 Package: src:openjpeg2; Maintainer for src:openjpeg2 is Debian PhotoTools Maintainers <pkg-phototools-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 30 Jun 2019 19:33:02 UTC Severity: important Tags: security, ...
Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pic in OpenJPEG through 230 allow remote attackers to cause a denial of service (application crash) (CVE-2018-20845) An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pic in Ope ...
Impact: Low Public Date: 2019-06-26 CWE: CWE-190 Bugzilla: 1728509: CVE-2018-20847 openjpeg: integer ov ...