A heap-buffer overflow was found in the way openjpeg2 handled certain PNG format files. An attacker could use this flaw to cause an application crash or in some cases execute arbitrary code with the permission of the user running such an application.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1901998 | Issue Tracking Patch Third Party Advisory |
https://github.com/uclouvain/openjpeg/issues/1283 | Exploit Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202101-29 | Third Party Advisory |
https://www.debian.org/security/2021/dsa-4882 | Third Party Advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2021-01-25T18:38:36
Updated: 2021-07-20T22:54:49
Reserved: 2020-10-27T00:00:00
Link: CVE-2020-27814
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-01-26T18:15:46.613
Modified: 2022-10-07T02:22:31.727
Link: CVE-2020-27814
JSON object: View
Redhat Information
No data.
CWE