Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-3660-1 chromium-browser security update
Debian DSA Debian DSA DSA-3678-1 openjpeg2 security update
EUVD EUVD EUVD-2016-6110 Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2024-08-06T00:53:48.202Z

Reserved: 2016-05-31T00:00:00

Link: CVE-2016-5159

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-09-11T10:59:15.240

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-5159

cve-icon Redhat

Severity : Important

Publid Date: 2016-08-31T00:00:00Z

Links: CVE-2016-5159 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses