Lucene search

K
osvGoogleOSV:DSA-3508-1
HistoryMar 06, 2016 - 12:00 a.m.

jasper - security update

2016-03-0600:00:00
Google
osv.dev
11

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

Several vulnerabilities were discovered in JasPer, a library for
manipulating JPEG-2000 files. The Common Vulnerabilities and Exposures
project identifies the following problems:

  • CVE-2016-1577
    Jacob Baines discovered a double-free flaw in the
    jas_iccattrval_destroy function. A remote attacker could exploit
    this flaw to cause an application using the JasPer library to crash,
    or potentially, to execute arbitrary code with the privileges of the
    user running the application.
  • CVE-2016-2089
    The Qihoo 360 Codesafe Team discovered a NULL pointer dereference
    flaw within the jas_matrix_clip function. A remote attacker could
    exploit this flaw to cause an application using the JasPer library
    to crash, resulting in a denial-of-service.
  • CVE-2016-2116
    Tyler Hicks discovered a memory leak flaw in the
    jas_iccprof_createfrombuf function. A remote attacker could exploit
    this flaw to cause the JasPer library to consume memory, resulting
    in a denial-of-service.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.900.1-13+deb7u4.

For the stable distribution (jessie), these problems have been fixed in
version 1.900.1-debian1-2.4+deb8u1.

We recommend that you upgrade your jasper packages.

CPENameOperatorVersion
jaspereq1.900.1-debian1-2.4

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P