CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
91.3%
Issue Overview:
The JPC_NOMINALGAIN function in jpc/jpc_t1cod.c in JasPer through 2.0.12 allows remote attackers to cause a denial of service (JPC_COX_RFT assertion failure) via unspecified vectors.(CVE-2016-9396)
JasPer 2.0.12 is vulnerable to a NULL pointer exception in the function jp2_encode which failed to check to see if the image contained at least one component resulting in a denial-of-service.(CVE-2017-1000050)
Affected Packages:
jasper
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update jasper to update your system.
New Packages:
aarch64:
jasper-1.900.1-33.amzn2.aarch64
jasper-devel-1.900.1-33.amzn2.aarch64
jasper-libs-1.900.1-33.amzn2.aarch64
jasper-utils-1.900.1-33.amzn2.aarch64
jasper-debuginfo-1.900.1-33.amzn2.aarch64
i686:
jasper-1.900.1-33.amzn2.i686
jasper-devel-1.900.1-33.amzn2.i686
jasper-libs-1.900.1-33.amzn2.i686
jasper-utils-1.900.1-33.amzn2.i686
jasper-debuginfo-1.900.1-33.amzn2.i686
src:
jasper-1.900.1-33.amzn2.src
x86_64:
jasper-1.900.1-33.amzn2.x86_64
jasper-devel-1.900.1-33.amzn2.x86_64
jasper-libs-1.900.1-33.amzn2.x86_64
jasper-utils-1.900.1-33.amzn2.x86_64
jasper-debuginfo-1.900.1-33.amzn2.x86_64
Red Hat: CVE-2016-9396, CVE-2017-1000050
Mitre: CVE-2016-9396, CVE-2017-1000050
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | jasper | < 1.900.1-33.amzn2 | jasper-1.900.1-33.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | jasper-devel | < 1.900.1-33.amzn2 | jasper-devel-1.900.1-33.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | jasper-libs | < 1.900.1-33.amzn2 | jasper-libs-1.900.1-33.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | jasper-utils | < 1.900.1-33.amzn2 | jasper-utils-1.900.1-33.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | jasper-debuginfo | < 1.900.1-33.amzn2 | jasper-debuginfo-1.900.1-33.amzn2.aarch64.rpm |
Amazon Linux | 2 | i686 | jasper | < 1.900.1-33.amzn2 | jasper-1.900.1-33.amzn2.i686.rpm |
Amazon Linux | 2 | i686 | jasper-devel | < 1.900.1-33.amzn2 | jasper-devel-1.900.1-33.amzn2.i686.rpm |
Amazon Linux | 2 | i686 | jasper-libs | < 1.900.1-33.amzn2 | jasper-libs-1.900.1-33.amzn2.i686.rpm |
Amazon Linux | 2 | i686 | jasper-utils | < 1.900.1-33.amzn2 | jasper-utils-1.900.1-33.amzn2.i686.rpm |
Amazon Linux | 2 | i686 | jasper-debuginfo | < 1.900.1-33.amzn2 | jasper-debuginfo-1.900.1-33.amzn2.i686.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
91.3%