Mandriva Linux Security Advisory : openjpeg (MDVSA-2012:157)

Medium Nessus Plugin ID 62423


The remote Mandriva Linux host is missing one or more security updates.


A security issue was identified and fixed in openjpeg :

A heap-based buffer overflow was found in the way OpenJPEG, an open source JPEG 2000 codec written in C language, performed parsing of JPEG2000 image files. A remote attacker could provide a specially crafted JPEG 2000 file, which when opened in an application linked against openjpeg would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application (CVE-2012-3535).

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 62423

File Name: mandriva_MDVSA-2012-157.nasl

Version: $Revision: 1.6 $

Type: local

Published: 2012/10/04

Modified: 2014/02/14

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64openjpeg-devel, p-cpe:/a:mandriva:linux:lib64openjpeg2, p-cpe:/a:mandriva:linux:libopenjpeg-devel, p-cpe:/a:mandriva:linux:libopenjpeg2, cpe:/o:mandriva:linux:2011

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/10/03

Reference Information

CVE: CVE-2012-3535

BID: 55214

MDVSA: 2012:157