Executive Summary

Informations
Name MDVSA-2012:157 First vendor Publication 2012-10-03
Vendor Mandriva Last vendor Modification 2012-10-03
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue was identified and fixed in openjpeg:

A heap-based buffer overflow was found in the way OpenJPEG, an open-source JPEG 2000 codec written in C language, performed parsing of JPEG2000 image files. A remote attacker could provide a specially crafted JPEG 2000 file, which when opened in an application linked against openjpeg would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application (CVE-2012-3535).

The updated packages have been patched to correct this issue.

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2012:157

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18382
 
Oval ID: oval:org.mitre.oval:def:18382
Title: DSA-2629-1 openjpeg - several issues
Description: Heap memory corruption leading to invalid free when processing certain Gray16 TIFF images.
Family: unix Class: patch
Reference(s): DSA-2629-1
CVE-2009-5030
CVE-2012-3358
CVE-2012-3535
Version: 7
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): openjpeg
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21480
 
Oval ID: oval:org.mitre.oval:def:21480
Title: RHSA-2012:1283: openjpeg security update (Important)
Description: Heap-based buffer overflow in OpenJPEG 1.5.0 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted JPEG2000 file.
Family: unix Class: patch
Reference(s): RHSA-2012:1283-01
CESA-2012:1283
CVE-2012-3535
Version: 4
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): openjpeg
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23856
 
Oval ID: oval:org.mitre.oval:def:23856
Title: ELSA-2012:1283: openjpeg security update (Important)
Description: Heap-based buffer overflow in OpenJPEG 1.5.0 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted JPEG2000 file.
Family: unix Class: patch
Reference(s): ELSA-2012:1283-01
CVE-2012-3535
Version: 6
Platform(s): Oracle Linux 6
Product(s): openjpeg
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27820
 
Oval ID: oval:org.mitre.oval:def:27820
Title: DEPRECATED: ELSA-2012-1283 -- openjpeg security update (important)
Description: [1.3-9] - Apply patch for CVE-2012-3535 Resolves: CVE-2012-3535
Family: unix Class: patch
Reference(s): ELSA-2012-1283
CVE-2012-3535
Version: 4
Platform(s): Oracle Linux 6
Product(s): openjpeg
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5

OpenVAS Exploits

Date Description
2012-11-02 Name : Fedora Update for openjpeg FEDORA-2012-14717
File : nvt/gb_fedora_2012_14717_openjpeg_fc17.nasl
2012-10-23 Name : Fedora Update for openjpeg FEDORA-2012-14707
File : nvt/gb_fedora_2012_14707_openjpeg_fc16.nasl
2012-10-05 Name : Mandriva Update for openjpeg MDVSA-2012:157 (openjpeg)
File : nvt/gb_mandriva_MDVSA_2012_157.nasl
2012-09-22 Name : CentOS Update for openjpeg CESA-2012:1283 centos6
File : nvt/gb_CESA-2012_1283_openjpeg_centos6.nasl
2012-09-22 Name : RedHat Update for openjpeg RHSA-2012:1283-01
File : nvt/gb_RHSA-2012_1283-01_openjpeg.nasl

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-717.nasl - Type : ACT_GATHER_INFO
2014-05-26 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_02db20d7e34a11e3bd92bcaec565249c.nasl - Type : ACT_GATHER_INFO
2013-10-11 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201310-07.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2012-125.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-1283.nasl - Type : ACT_GATHER_INFO
2013-04-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-110.nasl - Type : ACT_GATHER_INFO
2013-02-26 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2629.nasl - Type : ACT_GATHER_INFO
2012-11-02 Name : The remote Fedora host is missing a security update.
File : fedora_2012-14717.nasl - Type : ACT_GATHER_INFO
2012-10-23 Name : The remote Fedora host is missing a security update.
File : fedora_2012-14707.nasl - Type : ACT_GATHER_INFO
2012-10-16 Name : The remote Fedora host is missing a security update.
File : fedora_2012-14664.nasl - Type : ACT_GATHER_INFO
2012-10-04 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2012-157.nasl - Type : ACT_GATHER_INFO
2012-09-18 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-1283.nasl - Type : ACT_GATHER_INFO
2012-09-18 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-1283.nasl - Type : ACT_GATHER_INFO
2012-09-18 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20120917_openjpeg_on_SL6_x.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:43:11
  • Multiple Updates