HIGH · 8.8

CVE-2016-1681

Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service o...

Vulnerability Description

Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.

CVSS Score

8.8

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
DebianDebian Linux8.0
OpensuseLeap42.1
OpensuseOpensuse13.2
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Workstation6.0
SuseLinux Enterprise12.0
GoogleChrome<= 50.0.2661.102

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-1681?

CVE-2016-1681 is a vulnerability with a CVSS score of 8.8 (HIGH). Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service o...

How severe is CVE-2016-1681?

CVE-2016-1681 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-1681?

Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Opensuse Leap, Opensuse Opensuse, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.