Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w26c-gw69-r33c

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 97%
0.32606
Средний

Связанные уязвимости

ubuntu
больше 10 лет назад

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

redhat
больше 10 лет назад

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

nvd
больше 10 лет назад

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

debian
больше 10 лет назад

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jp ...

oracle-oval
больше 10 лет назад

ELSA-2014-2021: jasper security update (IMPORTANT)

EPSS

Процентиль: 97%
0.32606
Средний