Heap-based buffer overflow in the opj_dwt_interleave_v function in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to execute arbitrary code via crafted coordinate values in JPEG 2000 data.

References[email protected]/message/2T6IQAMS4W65MGP7UW5FPE22PXELTK5D/[email protected]/message/66BWMMMWXH32J5AOGLAJGZA3GH5LZHXH/[email protected]/message/AQ2IIIQSJ3J4MONBOGCG6XHLKKJX2HKM/[email protected]/message/H4IRSGYMBSHCBZP23CUDIRJ3LBKH6ZJ7/[email protected]/message/JYLOX7PZS3ZUHQ6RGI3M6H27B7I5ZZ26/[email protected]/message/YGKSEWWWED77Q5ZHK4OA2EKSJXLRU3MK/


Source: MITRE

Published: 2016-09-11

Updated: 2018-10-30

Type: CWE-119

Risk Information

CVSS v2.0

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH