CVE-2020-27823
13.05.2021, 15:15
A flaw was found in OpenJPEGs encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Vendor | Product | Version |
---|---|---|
uclouvain | openjpeg | 𝑥 < 2.4.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
blender |
| ||||||||||||||||||||||||
ghostscript |
| ||||||||||||||||||||||||
insighttoolkit4 |
| ||||||||||||||||||||||||
openjpeg |
| ||||||||||||||||||||||||
openjpeg2 |
| ||||||||||||||||||||||||
qtwebengine-opensource-src |
| ||||||||||||||||||||||||
texmaker |
|
Common Weakness Enumeration
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
References