Vigil@nce - Vigil@nce - OpenJPEG: buffer overflow via t2_encode_packet(), analyzed on 07/04/2022
June 2022 by Vigil@nce
Vigil@nce - An attacker can trigger a buffer overflow of OpenJPEG, via t2_encode_packet(), in order to trigger a denial of service, and possibly to run code.
Plus d'information sur : https://vigilance.fr/vulnerability/OpenJPEG-buffer-overflow-via-t2-encode-packet-37998