{"id":"CVE-2016-10506","details":"Division-by-zero vulnerabilities in the functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.","modified":"2026-04-11T03:43:52.274131Z","published":"2017-08-30T09:29:00.327Z","related":["openSUSE-SU-2024:11120-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/100573"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201710-26"},{"type":"FIX","url":"https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b"},{"type":"FIX","url":"https://github.com/uclouvain/openjpeg/issues/731"},{"type":"FIX","url":"https://github.com/uclouvain/openjpeg/issues/732"},{"type":"FIX","url":"https://github.com/uclouvain/openjpeg/issues/778"},{"type":"FIX","url":"https://github.com/uclouvain/openjpeg/issues/780"},{"type":"FIX","url":"https://github.com/uclouvain/openjpeg/issues/777"},{"type":"FIX","url":"https://github.com/uclouvain/openjpeg/issues/779"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/uclouvain/openjpeg","events":[{"introduced":"0"},{"last_affected":"1f1e968269bbd7eaade7955892a6d8c281b91df2"},{"fixed":"d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.1.2"}]}}],"versions":["v2.1.1","v2.1.2"],"database_specific":{"vanir_signatures":[{"source":"https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b","signature_version":"v1","id":"CVE-2016-10506-18976f34","digest":{"function_hash":"167164687698101658463742221507089281916","length":3179},"target":{"function":"opj_pi_next_cprl","file":"src/lib/openjp2/pi.c"},"signature_type":"Function","deprecated":false},{"source":"https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b","signature_version":"v1","id":"CVE-2016-10506-a92a5a3f","digest":{"threshold":0.9,"line_hashes":["51750788369557480713506462597020242584","230186866651863468500491536757644773115","95246622218983275867584400251886879705","147556222807824833849631254568777656820","51750788369557480713506462597020242584","230186866651863468500491536757644773115","95246622218983275867584400251886879705","147556222807824833849631254568777656820","51750788369557480713506462597020242584","230186866651863468500491536757644773115","95246622218983275867584400251886879705","147556222807824833849631254568777656820"]},"target":{"file":"src/lib/openjp2/pi.c"},"signature_type":"Line","deprecated":false},{"source":"https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b","signature_version":"v1","id":"CVE-2016-10506-c86ec459","digest":{"function_hash":"77641386530552347311649790027471995486","length":3236},"target":{"function":"opj_pi_next_rpcl","file":"src/lib/openjp2/pi.c"},"signature_type":"Function","deprecated":false},{"source":"https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b","signature_version":"v1","id":"CVE-2016-10506-d210f695","digest":{"function_hash":"256868168234277005893783454191035574985","length":3255},"target":{"function":"opj_pi_next_pcrl","file":"src/lib/openjp2/pi.c"},"signature_type":"Function","deprecated":false}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10506.json","vanir_signatures_modified":"2026-04-11T03:43:52Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}