CVE-2012-3358

NameCVE-2012-3358
DescriptionMultiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-2629-1
NVD severityhigh (attack range: remote)
Debian Bugs681075
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openjpeg (PTS)squeeze, squeeze (security)1.3+dfsg-4+squeeze3fixed
wheezy, wheezy (security)1.3+dfsg-4.8fixed
stretch, sid, jessie1:1.5.2-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openjpegsource(unstable)1.3+dfsg-4.4high681075
openjpegsourcesqueeze1.3+dfsg-4+squeeze1highDSA-2629-1

Notes

http://www.openwall.com/lists/oss-security/2012/07/11/1
Upstream patch: http://code.google.com/p/openjpeg/source/detail?r=1727
https://bugzilla.redhat.com/show_bug.cgi?id=835767

Search for package or bug name: Reporting problems