[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-4517

Date: (C)2011-12-14   (M)2017-08-29
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.

Reference:
SECUNIA-47193
SECUNIA-47306
SECUNIA-47353
BID-50992
OSVDB-77596
DSA-2371
FEDORA-2011-16955
FEDORA-2011-16966
RHSA-2011:1807
RHSA-2011:1811
RHSA-2015:0698
SSA:2015-302-02
USN-1315-1
VU#887409
http://www-01.ibm.com/support/docview.wss?uid=swg21660640
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
https://bugzilla.redhat.com/show_bug.cgi?id=747726
jasper-jpccrggetparms-bo(71701)
openSUSE-SU-2011:1317

CPE    1
cpe:/a:jasper_project:jasper:1.900.1
CWE    1
CWE-119
OVAL    18
oval:org.secpod.oval:def:1000430
oval:org.secpod.oval:def:600683
oval:org.secpod.oval:def:500081
oval:org.secpod.oval:def:202860
...

© 2013 SecPod Technologies