Vulnerability Description
An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uclouvain | Openjpeg | 2.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba8PatchVendor Advisory
- https://github.com/uclouvain/openjpeg/issues/1088Issue TrackingThird Party Advisory
- https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba8PatchVendor Advisory
- https://github.com/uclouvain/openjpeg/issues/1088Issue TrackingThird Party Advisory
FAQ
What is CVE-2018-7648?
CVE-2018-7648 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on t...
How severe is CVE-2018-7648?
CVE-2018-7648 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-7648?
Check the references section above for vendor advisories and patch information. Affected products include: Uclouvain Openjpeg.