CVE-2016-9573

MEDIUM

Uclouvain Openjpeg - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.

References (7)

Core 7
Core References
Exploit, Third Party Advisory x_refsource_confirm
https://github.com/uclouvain/openjpeg/issues/862
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201710-26
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/97073
Third Party Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2017-0838.html
Exploit, Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9573
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2017/dsa-3768

Scores

CVSS v3 6.5
EPSS 0.0106
EPSS Percentile 77.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H

Details

CWE
CWE-125
Status published
Products (10)
debian/debian_linux 8.0
redhat/enterprise_linux_desktop 7.0
redhat/enterprise_linux_server 7.0
redhat/enterprise_linux_server_aus 7.3
redhat/enterprise_linux_server_aus 7.4
redhat/enterprise_linux_server_eus 7.3
redhat/enterprise_linux_server_eus 7.4
redhat/enterprise_linux_server_eus 7.5
redhat/enterprise_linux_workstation 7.0
uclouvain/openjpeg 2.1.2
Published Aug 01, 2018
Tracked Since Feb 18, 2026