7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.012 Low
EPSS
Percentile
85.3%
Severity: High
Date : 2017-03-14
CVE-ID : CVE-2016-8886 CVE-2016-9591
Package : jasper
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-69
The package jasper before version 2.0.12-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.
Upgrade to 2.0.12-1.
The problems have been fixed upstream in version 2.0.12.
None.
A memory allocation failure was found in jas_malloc triggered by a
crafted file that results in an application crash leading to denial of
service.
A heap-use-after-free vulnerability has been found in jasper. The
vulnerability exists in code responsible for re-encoding the decoded
input image file to a J2P image. The vulnerability is caused by not
setting related pointers to be null after the pointers are freed (i.e.
missing Setting-Pointer-Null operations after free). The vulnerability
can further cause double-free.
A remote attacker is able to use specially crafted images that, when
processed, lead to arbitrary code execution or application crash.
http://seclists.org/oss-sec/2016/q4/214
https://blogs.gentoo.org/ago/2016/10/18/jasper-memory-allocation-failure-in-jas_malloc-jas_malloc-c
https://github.com/mdadams/jasper/commit/65536647d380571d1a9a6c91fa03775fb5bbd256
https://github.com/mdadams/jasper/issues/105
http://www.openwall.com/lists/oss-security/2016/12/16/3
https://github.com/mdadams/jasper/commit/03fe49ab96bf65fea784cdc256507ea88267fc7c
https://security.archlinux.org/CVE-2016-8886
https://security.archlinux.org/CVE-2016-9591
seclists.org/oss-sec/2016/q4/214
www.openwall.com/lists/oss-security/2016/12/16/3
blogs.gentoo.org/ago/2016/10/18/jasper-memory-allocation-failure-in-jas_malloc-jas_malloc-c
github.com/mdadams/jasper/commit/03fe49ab96bf65fea784cdc256507ea88267fc7c
github.com/mdadams/jasper/commit/65536647d380571d1a9a6c91fa03775fb5bbd256
github.com/mdadams/jasper/issues/105
security.archlinux.org/AVG-69
security.archlinux.org/CVE-2016-8886
security.archlinux.org/CVE-2016-9591
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.012 Low
EPSS
Percentile
85.3%