Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-9029

Опубликовано: 04 дек. 2014
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

Multiple off-by-one flaws, leading to heap-based buffer overflows, were found in the way JasPer decoded JPEG 2000 files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5netpbmWill not fix
Red Hat OpenShift Enterprise 2jasperAffected
Red Hat Enterprise Linux 6jasperFixedRHSA-2014:202118.12.2014
Red Hat Enterprise Linux 7jasperFixedRHSA-2014:202118.12.2014
RHEV Manager version 3.5spice-client-msiFixedRHSA-2015:069818.03.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-193->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1167537jasper: incorrect component number check in COC, RGN and QCC marker segment decoders (oCERT-2014-009)

EPSS

Процентиль: 97%
0.32606
Средний

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

nvd
больше 10 лет назад

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

debian
больше 10 лет назад

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jp ...

github
больше 3 лет назад

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

oracle-oval
больше 10 лет назад

ELSA-2014-2021: jasper security update (IMPORTANT)

EPSS

Процентиль: 97%
0.32606
Средний

6.8 Medium

CVSS2