CVE-2020-27824

MEDIUM

Uclouvain Openjpeg < 2.4.0 - Improper Input Validation

Title source: rule
STIX 2.1

Description

A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.

Exploits (1)

nomisec WORKING POC
by pazhanivel07 · poc
https://github.com/pazhanivel07/openjpeg-2.3.0_CVE-2020-27824

References (6)

Core 6
Core References
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2021/dsa-4882
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1905723
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuoct2021.html

Scores

CVSS v3 5.5
EPSS 0.0015
EPSS Percentile 35.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Details

CWE
CWE-125 CWE-20
Status published
Products (6)
debian/debian_linux 9.0
debian/debian_linux 10.0
fedoraproject/fedora 32
fedoraproject/fedora 33
redhat/enterprise_linux 8.0
uclouvain/openjpeg < 2.4.0
Published May 13, 2021
Tracked Since Feb 18, 2026