CVE-2024-56827: A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when...
5.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.13672%
CWE
Published
1/9/2025
Updated
5/13/2025
KEV Status
No
Technology
-
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided commit directly patches the function opj_j2k_add_tlmarker in src/lib/openjp2/j2k.c. The patch adds a bounds check (l_current_tile_part < cstr_index->tile_index[tileno].nb_tps) before accessing an array element (cstr_index->tile_index[tileno].tp_index[l_current_tile_part]). The absence of this check in the vulnerable version allowed for a heap buffer overflow when l_current_tile_part was greater than or equal to the number of tile-parts (nb_tps), leading to an out-of-bounds write. The vulnerability description aligns with this, stating a heap buffer overflow in the OpenJPEG project related to the opj_decompress utility, and this function is part of the JPEG 2000 decoding process.