Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-10251

Опубликовано: 04 нояб. 2016
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5netpbmWill not fix
Red Hat Enterprise Virtualization 3mingw-virt-viewerWill not fix
Red Hat Enterprise Linux 6jasperFixedRHSA-2017:120809.05.2017
Red Hat Enterprise Linux 7jasperFixedRHSA-2017:120809.05.2017

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-190->CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1434461jasper: integer overflow in jpc_pi_nextcprl(), leading to out-of-bounds read

EPSS

Процентиль: 74%
0.00815
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.

CVSS3: 7.8
nvd
больше 8 лет назад

Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.

CVSS3: 7.8
debian
больше 8 лет назад

Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in Jas ...

CVSS3: 7.8
github
больше 3 лет назад

Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.

suse-cvrf
больше 8 лет назад

Security update for jasper

EPSS

Процентиль: 74%
0.00815
Низкий

5.5 Medium

CVSS3