漏洞信息详情
OpenJPEG 代码问题漏洞
漏洞简介
OpenJPEG是一款基于C语言的开源JPEG2000编码解码器。
OpenJPEG 2.3.1存在代码问题漏洞,该漏洞源于lib /openjp2/mqc.c中发现了堆缓冲区覆盖错误,导致越界写入。攻击者利用该漏洞导致远程拒绝服务或远程执行代码。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://github.com/uclouvain/openjpeg/issues/1283
参考网址
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4882
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html
来源:MISC
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1901998
来源:MISC
链接:https://github.com/uclouvain/openjpeg/issues/1283
来源:GENTOO
链接:https://security.gentoo.org/glsa/202101-29
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-27814
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3809
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0084/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164843/Red-Hat-Security-Advisory-2021-4251-04.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/OpenJPEG-buffer-overflow-via-lib-openjp2-mqc-c-34080
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1125
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0440
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161130/Gentoo-Linux-Security-Advisory-202101-29.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161819/Ubuntu-Security-Notice-USN-4880-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0921
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...