Search for vulnerabilities
Vulnerability ID | VCID-bezp-5u19-9be7 |
Aliases |
CVE-2025-54874
|
Summary | OpenJPEG is an open-source JPEG 2000 codec. In OpenJPEG 2.5.3 and earlier, a call to opj_jp2_read_header may lead to OOB heap memory write when the data stream p_stream is too short and p_image is not initialized. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 7.2 |
Risk | 3.6 |
Affected and Fixed Packages | Package Details |
CWE-457 | Use of Uninitialized Variable |
Reference id | Reference type | URL |
---|---|---|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54874.json | ||
https://api.first.org/data/v1/epss?cve=CVE-2025-54874 | ||
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml | ||
1110443 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110443 | |
1573 | https://github.com/uclouvain/openjpeg/pull/1573 | |
2386543 | https://bugzilla.redhat.com/show_bug.cgi?id=2386543 | |
CVE-2025-54874 | https://nvd.nist.gov/vuln/detail/CVE-2025-54874 | |
f809b80c67717c152a5ad30bf06774f00da4fd2d | https://github.com/uclouvain/openjpeg/commit/f809b80c67717c152a5ad30bf06774f00da4fd2d | |
GHSL-2025-057_OpenCV | https://securitylab.github.com/advisories/GHSL-2025-057_OpenCV |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Attack Requirements (AT) | Privileges Required (PR) | User Interaction (UI) | Vulnerable System Impact Confidentiality (VC) | Vulnerable System Impact Integrity (VI) | Vulnerable System Impact Availability (VA) | Subsequent System Impact Confidentiality (SC) | Subsequent System Impact Integrity (SI) | Subsequent System Impact Availability (SA) |
---|---|---|---|---|---|---|---|---|---|---|
network adjacent local physical |
low high |
none present |
none low high |
none passive active |
high low none |
high low none |
high low none |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Attack Requirements (AT) | Privileges Required (PR) | User Interaction (UI) | Vulnerable System Impact Confidentiality (VC) | Vulnerable System Impact Integrity (VI) | Vulnerable System Impact Availability (VA) | Subsequent System Impact Confidentiality (SC) | Subsequent System Impact Integrity (SI) | Subsequent System Impact Availability (SA) |
---|---|---|---|---|---|---|---|---|---|---|
network adjacent local physical |
low high |
none present |
none low high |
none passive active |
high low none |
high low none |
high low none |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Attack Requirements (AT) | Privileges Required (PR) | User Interaction (UI) | Vulnerable System Impact Confidentiality (VC) | Vulnerable System Impact Integrity (VI) | Vulnerable System Impact Availability (VA) | Subsequent System Impact Confidentiality (SC) | Subsequent System Impact Integrity (SI) | Subsequent System Impact Availability (SA) |
---|---|---|---|---|---|---|---|---|---|---|
network adjacent local physical |
low high |
none present |
none low high |
none passive active |
high low none |
high low none |
high low none |
high low none |
high low none |
high low none |
Percentile | 0.01413 |
EPSS Score | 0.00013 |
Published At | Aug. 6, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-08-06T08:02:06.043989+00:00 | SUSE Severity Score Importer | Import | https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml | 37.0.0 |