CVE-2018-16375
Publication date 3 September 2018
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.
From the Ubuntu Security Team
It was discovered that OpenJPEG incorrectly handled certain PNM files. A remote attacker could possibly use this issue to cause a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
openjpeg | 20.04 LTS focal | Not in release |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
openjpeg2 | 20.04 LTS focal |
Not affected
|
18.04 LTS bionic |
Fixed 2.3.0-2+deb10u2ubuntu0.1~esm1
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
mdeslaur
Ubuntu packages are built with -DBUILD_JPWL:BOOL=OFF, so the vulnerable code isn't compiled
ccdm94
the openjpeg package does not include the file patched by commit 619e1b086ea. Before the refactoring, there was a single convert.c file, which according to the code, seems to be affected by this vulnerability, however, it seems like the vulnerability in this case is related to CVE-2016-9118 instead, which has a very similar patch.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4782-1
- OpenJPEG vulnerabilities
- 17 March 2021