Multiple integer overflows in the (1) jas_realloc function in base/jas_malloc.c and (2) mem_resize function in base/jas_stream.c in JasPer before 1.900.22 allow remote attackers to cause a denial of service via a crafted image, which triggers use after free vulnerabilities.
References
Link | Resource |
---|---|
https://github.com/mdadams/jasper/commit/634ce8e8a5accc0fa05dd2c20d42b4749d4b2735 | Issue Tracking Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1393882 | Issue Tracking Third Party Advisory |
https://blogs.gentoo.org/ago/2016/11/07/jasper-use-after-free-in-jas_realloc-jas_malloc-c | Third Party Advisory |
http://www.securityfocus.com/bid/94224 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2016/11/10/4 | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201707-07 | |
https://access.redhat.com/errata/RHSA-2017:1208 | |
https://usn.ubuntu.com/3693-1/ |
Configurations
Information
Published : 2017-03-23 11:59
Updated : 2018-06-28 18:29
NVD link : CVE-2016-9262
Mitre link : CVE-2016-9262
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
jasper_project
- jasper