![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.2.2019.2639 |
Category: | Huawei EulerOS Local Security Checks |
Title: | Huawei EulerOS: Security Advisory for openjpeg (EulerOS-SA-2019-2639) |
Summary: | The remote host is missing an update for the Huawei EulerOS 'openjpeg' package(s) announced via the EulerOS-SA-2019-2639 advisory. |
Description: | Summary: The remote host is missing an update for the Huawei EulerOS 'openjpeg' package(s) announced via the EulerOS-SA-2019-2639 advisory. Vulnerability Insight: A stack-based buffer overflow was discovered in the pgxtoimage function in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.(CVE-2017-14041) An invalid write access was discovered in bin/jp2/convert.c in OpenJPEG 2.2.0, triggering a crash in the tgatoimage function. The vulnerability may lead to remote denial of service or possibly unspecified other impact.(CVE-2017-14040) convert.c in OpenJPEG before 2.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors involving the variable s.(CVE-2016-7445) Heap-based buffer overflow in the JPEG2000 image tile decoder in OpenJPEG before 1.5.2 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file because of incorrect j2k_decode, j2k_read_eoc, and tcd_decode_tile interaction, a related issue to CVE-2013-6045. NOTE: this is not a duplicate of CVE-2013-1447, because the scope of CVE-2013-1447 was specifically defined in [link moved to references] as only 'null pointer dereferences, division by zero, and anything that would just fit as DoS.'(CVE-2014-0158) In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.(CVE-2017-17479) NULL pointer dereference vulnerabilities in the imagetopnm function in convert.c, sycc444_to_rgb function in color.c, color_esycc_to_rgb function in color.c, and sycc422_to_rgb function in color.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.(CVE-2016-10505) OpenJPEG 1.5.1 allows remote attackers to cause a denial of service via unspecified vectors that trigger NULL pointer dereferences, division-by-zero, and other errors.(CVE-2013-6887) Affected Software/OS: 'openjpeg' package(s) on Huawei EulerOS V2.0SP3. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-6887 http://seclists.org/oss-sec/2013/q4/412 http://secunia.com/advisories/57285 Common Vulnerability Exposure (CVE) ID: CVE-2014-0158 https://bugzilla.redhat.com/show_bug.cgi?id=1082925 https://bugzilla.suse.com/show_bug.cgi?id=871412 Common Vulnerability Exposure (CVE) ID: CVE-2016-10505 https://security.gentoo.org/glsa/201710-26 Common Vulnerability Exposure (CVE) ID: CVE-2016-7445 BugTraq ID: 93040 http://www.securityfocus.com/bid/93040 https://security.gentoo.org/glsa/201612-26 http://www.openwall.com/lists/oss-security/2016/09/18/4 http://www.openwall.com/lists/oss-security/2016/09/18/6 SuSE Security Announcement: openSUSE-SU-2016:2424 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-09/msg00109.html Common Vulnerability Exposure (CVE) ID: CVE-2017-14040 BugTraq ID: 100553 http://www.securityfocus.com/bid/100553 Debian Security Information: DSA-4013 (Google Search) http://www.debian.org/security/2017/dsa-4013 https://blogs.gentoo.org/ago/2017/08/28/openjpeg-invalid-memory-write-in-tgatoimage-convert-c/ https://github.com/uclouvain/openjpeg/commit/2cd30c2b06ce332dede81cccad8b334cde997281 https://github.com/uclouvain/openjpeg/issues/995 Common Vulnerability Exposure (CVE) ID: CVE-2017-14041 BugTraq ID: 100555 http://www.securityfocus.com/bid/100555 https://blogs.gentoo.org/ago/2017/08/28/openjpeg-stack-based-buffer-overflow-write-in-pgxtoimage-convert-c/ https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9 https://github.com/uclouvain/openjpeg/issues/997 Common Vulnerability Exposure (CVE) ID: CVE-2017-17479 https://github.com/uclouvain/openjpeg/issues/1044 |
Copyright | Copyright (C) 2020 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |