{"id":"CVE-2017-17480","details":"In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtovolume function in jp3d/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.","modified":"2026-05-18T05:49:32.384484714Z","published":"2017-12-08T19:29:00.227Z","related":["SUSE-SU-2018:1364-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"18.04"}],"vendor_product":"canonical:ubuntu_linux","source":"CPE_FIELD","cpes":["cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"]},{"extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"https://github.com/uclouvain/openjpeg/issues/1044"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00018.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4109-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4405"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/uclouvain/openjpeg","events":[{"introduced":"0"},{"last_affected":"081de4b15f54cb4482035b7bf5e3fb443e4bc84b"}],"database_specific":{"cpe":"cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"2.3.0"}],"source":"CPE_FIELD"}}],"versions":["v2.3.0","v2.2.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-17480.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}