{"id":"CVE-2016-8332","details":"A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution when parsing a crafted image. An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library. A specially crafted jpeg2000 file can cause an out of bound heap write resulting in heap corruption leading to arbitrary code execution. For a successful attack, the target user needs to open a malicious jpeg2000 file. The jpeg2000 image file format is mostly used for embedding images inside PDF documents and the OpenJpeg library is used by a number of popular PDF renderers making PDF documents a likely attack vector.","modified":"2026-04-16T06:17:54.211694750Z","published":"2016-10-28T14:59:00.167Z","related":["SUSE-SU-2016:3270-1","openSUSE-SU-2017:2567-1","openSUSE-SU-2024:11120-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/93242"},{"type":"WEB","url":"http://www.securitytracker.com/id/1038623"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3768"},{"type":"ADVISORY","url":"https://github.com/uclouvain/openjpeg/releases/tag/v2.1.2"},{"type":"EVIDENCE","url":"http://www.talosintelligence.com/reports/TALOS-2016-0193/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/uclouvain/openjpeg","events":[{"introduced":"0"},{"last_affected":"53f25200ed696cf5dc71d5fe12faad2570861b20"},{"fixed":"1f1e968269bbd7eaade7955892a6d8c281b91df2"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.1.1"}]}}],"versions":["v2.1.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-8332.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}