CVE-2016-10507
Gentoo Linux Security Advisory 201710-26
Severity Score
6.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Integer overflow vulnerability in the bmp24toimage function in convertbmp.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted bmp file.
Una vulnerabilidad de desbordamiento de enteros en la función bmp24toimage de convertbmp.c en OpenJPEG en versiones anteriores a la 2.2.0 permite que atacantes remotos provoquen una denegación de servicio (sobrelectura de búfer basada en montículos y fallo de aplicación) mediante un archivo bmp manipulado.
Multiple vulnerabilities have been found in OpenJPEG, the worst of which may allow remote attackers to execute arbitrary code. Versions less than 2.3.0:2 are affected.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2017-08-30 CVE Reserved
- 2017-08-30 CVE Published
- 2024-08-06 CVE Updated
- 2025-06-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/100567 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/uclouvain/openjpeg/commit/da940424816e11d624362ce080bc026adffa26e8 | 2020-09-09 | |
https://github.com/uclouvain/openjpeg/issues/833 | 2020-09-09 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201710-26 | 2020-09-09 |