Miggo Logo

CVE-2016-9115:
Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is...

6.5

CVSS Score
3.0

Basic Information

EPSS Score
0.58325%
Published
5/13/2022
Updated
2/1/2023
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The primary evidence for the vulnerable function imagetotga comes directly from the vulnerability title and description, as well as the linked GitHub issue #858. The issue includes an Address Sanitizer (ASan) log that clearly indicates a heap-buffer-overflow within this function during the processing of a J2K file. Although a specific fixing commit was not found through the provided tools and initial search, the consistent reporting across multiple sources (vulnerability description, GitHub issue, ASan log) provides high confidence in identifying imagetotga as the vulnerable function. The vulnerability occurs in convert.c within the OpenJPEG library.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

***p *u***r Ov*r-r*** in *un*tion im***tot** o* *onv*rt.*(jp*):*** in Op*nJP** *.*.*. Imp**t is **ni*l o* S*rvi**. Som*on* must op*n * *r**t** j*k *il*.

Reasoning

T** prim*ry *vi**n** *or t** vuln*r**l* *un*tion `im***tot**` *om*s *ir**tly *rom t** vuln*r**ility titl* *n* **s*ription, *s w*ll *s t** link** *it*u* issu* #***. T** issu* in*lu**s *n ***r*ss S*nitiz*r (*S*n) lo* t**t *l**rly in*i**t*s * ***p-*u***