Vulnerability Description
OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uclouvain | Openjpeg | <= 2.3.1 |
| Fedoraproject | Fedora | 30 |
| Debian | Debian Linux | 8.0 |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Eus | 7.7 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.7 |
| Redhat | Enterprise Linux Server Tus | 7.7 |
| Redhat | Enterprise Linux Workstation | 7.0 |
| Oracle | Georaster | 18c |
| Oracle | Outside In Technology | 8.5.4 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2020:0262Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0274Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0296Third Party Advisory
- https://github.com/uclouvain/openjpeg/issues/1228ExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/01/msg00025.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/07/msg00008.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.debian.org/security/2021/dsa-4882Third Party Advisory
- https://www.oracle.com/security-alerts/cpujul2020.htmlPatchThird Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0262Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0274Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0296Third Party Advisory
- https://github.com/uclouvain/openjpeg/issues/1228ExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/01/msg00025.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2020-6851?
CVE-2020-6851 is a vulnerability with a CVSS score of 7.5 (HIGH). OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
How severe is CVE-2020-6851?
CVE-2020-6851 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-6851?
Check the references section above for vendor advisories and patch information. Affected products include: Uclouvain Openjpeg, Fedoraproject Fedora, Debian Debian Linux, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop.