Out-of-bounds Read Affecting jasper package, versions <1.900.1-debian1-2.4+deb8u4


0.0
medium

Snyk CVSS

    Attack Complexity Low
    User Interaction Required
    Availability High

    Threat Intelligence

    EPSS 0.54% (78th percentile)
Expand this section
NVD
6.5 medium
Expand this section
Red Hat
3.3 low
Expand this section
SUSE
3.7 low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN8-JASPER-342945
  • published 4 Sep 2017
  • disclosed 4 Sep 2017

How to fix?

Upgrade Debian:8 jasper to version 1.900.1-debian1-2.4+deb8u4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jasper package and not the jasper package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jas_image_ishomosamp function in libjasper/base/jas_image.c.