CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
96.6%
Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | enterprise_linux | 6.0 | cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* |
redhat | enterprise_linux | 7.0 | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* |
jasper_project | jasper | 1.900.1 | cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:* |
advisories.mageia.org/MGASA-2014-0539.html
lists.opensuse.org/opensuse-updates/2015-01/msg00013.html
lists.opensuse.org/opensuse-updates/2015-01/msg00014.html
lists.opensuse.org/opensuse-updates/2015-01/msg00017.html
packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html
rhn.redhat.com/errata/RHSA-2014-2021.html
rhn.redhat.com/errata/RHSA-2015-0698.html
rhn.redhat.com/errata/RHSA-2015-1713.html
secunia.com/advisories/61747
secunia.com/advisories/62311
secunia.com/advisories/62615
secunia.com/advisories/62619
www.debian.org/security/2014/dsa-3106
www.mandriva.com/security/advisories?name=MDVSA-2015:012
www.mandriva.com/security/advisories?name=MDVSA-2015:159
www.securityfocus.com/bid/71746
www.securitytracker.com/id/1033459
www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
www.ubuntu.com/usn/USN-2483-1
www.ubuntu.com/usn/USN-2483-2
www.ocert.org/advisories/ocert-2014-012.html