CVE-2020-27824
MEDIUMUclouvain Openjpeg < 2.4.0 - Improper Input Validation
Title source: ruleDescription
A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.
Exploits (1)
nomisec
WORKING POC
by pazhanivel07 · poc
https://github.com/pazhanivel07/openjpeg-2.3.0_CVE-2020-27824
References (6)
Core 6
Core References
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQR4EWRFFZQDMFPZKFZ6I3USLMW6TKTP/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2021/dsa-4882
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1905723
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuoct2021.html
Scores
CVSS v3
5.5
EPSS
0.0015
EPSS Percentile
35.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
CWE-20
Status
published
Products (6)
debian/debian_linux
9.0
debian/debian_linux
10.0
fedoraproject/fedora
32
fedoraproject/fedora
33
redhat/enterprise_linux
8.0
uclouvain/openjpeg
< 2.4.0
Published
May 13, 2021
Tracked Since
Feb 18, 2026