A stack-based buffer overflow was discovered in the pgxtoimage function
in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an
out-of-bounds write, which may lead to remote denial of service or
possibly remote code execution.
Created mingw-openjpeg tracking bugs for this issue:
Affects: fedora-all [bug 1487363]
Created mingw-openjpeg2 tracking bugs for this issue:
Affects: fedora-all [bug 1487365]
Created openjpeg tracking bugs for this issue:
Affects: fedora-all [bug 1487362]
Created openjpeg2 tracking bugs for this issue:
Affects: epel-all [bug 1487366]
Affects: fedora-all [bug 1487364]
A specially crafted JPG2 file can cause OOB write, which can cause application crash. Code execution seems to be unlikely on modern systems and the way buffer stack is overwritten (via fscanf() as seen from the patch).
Is openjpeg-1.3 (RHEL6) and 1.5.1 (RHEL7) affected at all? I couldn't get 1.5.1's image_to_j2k tool to crash using the exploit image from Novell bugzilla.