
CVE-2016-9112 – Ubuntu Security Notice USN-4497-1
https://notcve.org/view.php?id=CVE-2016-9112
29 Oct 2016 — Floating Point Exception (aka FPE or divide by zero) in opj_pi_next_cprl function in openjp2/pi.c:523 in OpenJPEG 2.1.2. Floating Point Exception (también conocido como FPE o dividir entre cero) en la función opj_pi_next_cprl en openjp2/pi.c:523 en OpenJPEG 2.1.2. It was discovered that OpenJPEG incorrectly handled certain image files. A remote attacker could possibly use this issue to cause a denial of service. It was discovered that OpenJPEG did not properly handle certain input. • http://www.securityfocus.com/bid/93978 • CWE-369: Divide By Zero •

CVE-2016-8332
https://notcve.org/view.php?id=CVE-2016-8332
28 Oct 2016 — A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution when parsing a crafted image. An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library. A specially crafted jpeg2000 file can cause an out of bound heap write resulting in heap corruption leading to arbitrary code execution. For a successful attack, the target user needs to open a malicious jpeg2000 file. The jpeg2000 image file format is mostly used for embedding ima... • http://www.debian.org/security/2017/dsa-3768 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-7445 – Gentoo Linux Security Advisory 201612-26
https://notcve.org/view.php?id=CVE-2016-7445
03 Oct 2016 — convert.c in OpenJPEG before 2.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors involving the variable s. convert.c en OpenJPEG en versiones anteriores a 2.1.2 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero NULL y caída de aplicación) a través de vectores que involucran a la variable s. Multiple vulnerabilities have been found in OpenJPEG, the worst of which may allow execution of arbitrary code. Vers... • http://lists.opensuse.org/opensuse-updates/2016-09/msg00109.html • CWE-476: NULL Pointer Dereference •

CVE-2015-8871 – Gentoo Linux Security Advisory 201612-26
https://notcve.org/view.php?id=CVE-2015-8871
21 Sep 2016 — Use-after-free vulnerability in the opj_j2k_write_mco function in j2k.c in OpenJPEG before 2.1.1 allows remote attackers to have unspecified impact via unknown vectors. Vulnerabilidad de uso después de liberación de memoria en la función opj_j2k_write_mco en j2k.c en OpenJPEG en versiones anteriores a 2.1.1 permite a atacantes remotos tener impacto no especificado a través de vectores desconocidos. Multiple vulnerabilities have been found in OpenJPEG, the worst of which may allow execution of arbitrary code... • http://www.debian.org/security/2016/dsa-3665 • CWE-416: Use After Free •

CVE-2016-7163 – openjpeg: Integer overflow in opj_pi_create_decode
https://notcve.org/view.php?id=CVE-2016-7163
21 Sep 2016 — Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write. Desbordamiento de entero en la función opj_pi_create_decode en pi.c en OpenJPEG permite a atacantes remotos ejecutar código arbitrario a través de un archivo JP2 manipulado, lo que desencadena una lectura o escritura fuera de límites. An integer overflow, leading to a heap buffer overflow, was found in OpenJPEG. An ... • http://rhn.redhat.com/errata/RHSA-2017-0559.html • CWE-190: Integer Overflow or Wraparound •

CVE-2016-1923 – Gentoo Linux Security Advisory 201612-26
https://notcve.org/view.php?id=CVE-2016-1923
27 Jan 2016 — Heap-based buffer overflow in the opj_j2k_update_image_data function in OpenJpeg 2016.1.18 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image. Desbordamiento de buffer basado en memoria dinámica en la función opj_j2k_update_image_data en OpenJpeg 2016.1.18 permite a atacantes remotos causar una denegación de servicio (lectura fuera de rango y caída de aplicación) a través de una imagen JPEG 2000 manipulada. Multiple vulnerabilities h... • http://www.openwall.com/lists/oss-security/2016/01/18/4 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-1924 – Gentoo Linux Security Advisory 201612-26
https://notcve.org/view.php?id=CVE-2016-1924
27 Jan 2016 — The opj_tgt_reset function in OpenJpeg 2016.1.18 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image. La función opj_tgt_reset en OpenJpeg 2016.1.18 permite a atacantes remotos causar una denegación de servicio (lectura fuera de rango y caída de aplicación) a través de una imagen JPEG 2000 manipulada. Multiple vulnerabilities have been found in OpenJPEG, the worst of which may allow execution of arbitrary code. Versions less than 2.1.... • http://www.debian.org/security/2016/dsa-3665 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-4289 – Gentoo Linux Security Advisory 201412-24
https://notcve.org/view.php?id=CVE-2013-4289
18 Apr 2014 — Multiple integer overflows in lib/openjp3d/jp3d.c in OpenJPEG before 1.5.2 allow remote attackers to have unspecified impact and vectors, which trigger a heap-based buffer overflow. Múltiples desbordamientos de entero en lib/openjp3d/jp3d.c en OpenJPEG en versiones anteriores a 1.5.2 permiten a atacantes remotos tener impacto y vectores no especificados, lo que desencadena un desbordamiento de búfer basado en memoria dinámica. Multiple vulnerabilities have been found in OpenJPEG, the worst of which may resu... • http://openjpeg.googlecode.com/svn/tags/version.1.5.2/NEWS • CWE-189: Numeric Errors •

CVE-2013-4290 – Gentoo Linux Security Advisory 201412-24
https://notcve.org/view.php?id=CVE-2013-4290
18 Apr 2014 — Stack-based buffer overflow in OpenJPEG before 1.5.2 allows remote attackers to have unspecified impact via unknown vectors to (1) lib/openjp3d/opj_jp3d_compress.c, (2) bin/jp3d/convert.c, or (3) lib/openjp3d/event.c. Desbordamiento de buffer basado en pila en OpenJPEG en versiones anteriores a 1.5.2 permite a atacantes remotos tener un impacto no especificado a través de vectores desconocidos en (1) lib/openjp3d/opj_jp3d_compress.c, (2) bin/jp3d/convert.c o (3) lib/openjp3d/event.c. Multiple vulnerabilitie... • http://openjpeg.googlecode.com/svn/tags/version.1.5.2/NEWS • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-6053 – Gentoo Linux Security Advisory 201412-24
https://notcve.org/view.php?id=CVE-2013-6053
18 Jan 2014 — OpenJPEG 1.5.1 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based out-of-bounds read. OpenJPEG 1.5.1 permite a atacantes remotos obtener información sensible a través de vectores no especificados que provocan una lectura basada en memoria dinámica fuera de rango. Multiple heap-based buffer overflow flaws were found in OpenJPEG. An attacker could create a specially crafted OpenJPEG image that, when opened, could cause an application using openjpeg to cra... • http://openjpeg.googlecode.com/svn/tags/version.1.5.2/NEWS • CWE-20: Improper Input Validation •