A stack-based buffer overflow was discovered in the pgxtoimage function in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution. Upstream bug: https://github.com/uclouvain/openjpeg/issues/997 Upstream patch: https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9 References: https://bugzilla.novell.com/show_bug.cgi?id=1056562
Created mingw-openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1487363] Created mingw-openjpeg2 tracking bugs for this issue: Affects: fedora-all [bug 1487365] Created openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1487362] Created openjpeg2 tracking bugs for this issue: Affects: epel-all [bug 1487366] Affects: fedora-all [bug 1487364]
Analysis: A specially crafted JPG2 file can cause OOB write, which can cause application crash. Code execution seems to be unlikely on modern systems and the way buffer stack is overwritten (via fscanf() as seen from the patch).
Is openjpeg-1.3 (RHEL6) and 1.5.1 (RHEL7) affected at all? I couldn't get 1.5.1's image_to_j2k tool to crash using the exploit image from Novell bugzilla.