[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-4517Date: (C)2011-12-14   (M)2023-12-28


The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 8.6
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-47193
SECUNIA-47306
SECUNIA-47353
BID-50992
OSVDB-77596
DSA-2371
FEDORA-2011-16955
FEDORA-2011-16966
RHSA-2011:1807
RHSA-2011:1811
RHSA-2015:0698
SSA:2015-302-02
USN-1315-1
VU#887409
http://www-01.ibm.com/support/docview.wss?uid=swg21660640
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
https://bugzilla.redhat.com/show_bug.cgi?id=747726
jasper-jpccrggetparms-bo(71701)
openSUSE-SU-2011:1317

CWE    1
CWE-787
OVAL    23
oval:org.secpod.oval:def:111593
oval:org.secpod.oval:def:111590
oval:org.secpod.oval:def:500276
oval:org.secpod.oval:def:103438
...

© SecPod Technologies