The JasPer project is an open source implementation for the JPEG-2000 codec.
The library is affected by a double-free vulnerability in function jas_iccattrval_destroy() as well as a heap-based buffer overflow in function jp2_decode().
A specially crafted jp2 file, can be used to trigger the vulnerabilities.
JasPer <= 1.900.1
Credit: vulnerability report received from the Google Security Team.
CVE: CVE-2014-8137 (double-free), CVE-2014-8138 (heap overflow)
2014-12-10: vulnerability report received 2014-12-10: contacted affected vendors 2014-12-10: assigned CVEs 2014-12-18: patch contributed by Tomas Hoger from Red Hat Product Security 2014-12-18: advisory release
References: http://www.ece.uvic.ca/~frodo/jasper https://bugzilla.redhat.com/show_bug.cgi?id=1173157 https://bugzilla.redhat.com/show_bug.cgi?id=1173162
-- Andrea Barisani | Founder & Project Coordinator oCERT | OSS Computer Security Incident Response Team <email@example.com> http://www.ocert.org 0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E "Pluralitas non est ponenda sine necessitate"