Think you have a false positive on this rule?

Sid 1-39161

Message

FILE-PDF Google Chrome PDFium jpeg2000 SIZ segment check failure heap buffer overflow attempt

Summary

Heap-based buffer overflow in the opjj2kreadSPCodSPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.

Impact

CVSS base score 8.8 CVSS impact score 5.9 CVSS exploitability score 2.8 confidentialityImpact HIGH integrityImpact HIGH availabilityImpact HIGH

CVE-2016-1681:

CVSS base score 8.8

CVSS impact score 5.9

CVSS exploitability score 2.8

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

CVE-2016-1681: Heap-based buffer overflow in the opjj2kreadSPCodSPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.

Affected systems

  • google chrome 50.0.2661.102
  • debian debian_linux 8.0
  • novell leap 42.1
  • novell opensuse 13.2
  • redhat enterpriselinuxdesktop 6.0
  • redhat enterpriselinuxserver 6.0
  • redhat enterpriselinuxworkstation 6.0
  • suse linux_enterprise 12.0

Ease of attack

CVE-2016-1681:

Access Vector

Access Complexity

Authentication

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References

  • www.talosintelligence.com/reports/TALOS-2016-0174/