Description
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1902-1 | djvulibre security update |
Debian DLA |
DLA-2667-1 | djvulibre security update |
Debian DSA |
DSA-5032-1 | djvulibre security update |
EUVD |
EUVD-2019-6212 | DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h. |
Ubuntu USN |
USN-4198-1 | DjVuLibre vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T00:42:03.790Z
Reserved: 2019-08-18T00:00:00.000Z
Link: CVE-2019-15145
No data.
Status : Modified
Published: 2019-08-18T19:15:10.387
Modified: 2024-11-21T04:28:09.390
Link: CVE-2019-15145
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN