CVE-2011-4516

Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html Mailing List Third Party Advisory
http://osvdb.org/77595 Broken Link
http://rhn.redhat.com/errata/RHSA-2015-0698.html Third Party Advisory
http://secunia.com/advisories/47193 Not Applicable
http://secunia.com/advisories/47306 Not Applicable
http://secunia.com/advisories/47353 Not Applicable
http://www-01.ibm.com/support/docview.wss?uid=swg21660640 Broken Link
http://www.debian.org/security/2011/dsa-2371 Third Party Advisory
http://www.kb.cert.org/vuls/id/887409 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1807.html Not Applicable
http://www.redhat.com/support/errata/RHSA-2011-1811.html Not Applicable Third Party Advisory
http://www.securityfocus.com/bid/50992 Third Party Advisory VDB Entry
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 Release Notes
http://www.ubuntu.com/usn/USN-1315-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=747726 Issue Tracking
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html Mailing List Third Party Advisory
http://osvdb.org/77595 Broken Link
http://rhn.redhat.com/errata/RHSA-2015-0698.html Third Party Advisory
http://secunia.com/advisories/47193 Not Applicable
http://secunia.com/advisories/47306 Not Applicable
http://secunia.com/advisories/47353 Not Applicable
http://www-01.ibm.com/support/docview.wss?uid=swg21660640 Broken Link
http://www.debian.org/security/2011/dsa-2371 Third Party Advisory
http://www.kb.cert.org/vuls/id/887409 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1807.html Not Applicable
http://www.redhat.com/support/errata/RHSA-2011-1811.html Not Applicable Third Party Advisory
http://www.securityfocus.com/bid/50992 Third Party Advisory VDB Entry
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 Release Notes
http://www.ubuntu.com/usn/USN-1315-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=747726 Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:outside_in_technology:8.3.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.3.7:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html - Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html - Mailing List, Third Party Advisory
References () http://osvdb.org/77595 - Broken Link () http://osvdb.org/77595 - Broken Link
References () http://rhn.redhat.com/errata/RHSA-2015-0698.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-0698.html - Third Party Advisory
References () http://secunia.com/advisories/47193 - Not Applicable () http://secunia.com/advisories/47193 - Not Applicable
References () http://secunia.com/advisories/47306 - Not Applicable () http://secunia.com/advisories/47306 - Not Applicable
References () http://secunia.com/advisories/47353 - Not Applicable () http://secunia.com/advisories/47353 - Not Applicable
References () http://www-01.ibm.com/support/docview.wss?uid=swg21660640 - Broken Link () http://www-01.ibm.com/support/docview.wss?uid=swg21660640 - Broken Link
References () http://www.debian.org/security/2011/dsa-2371 - Third Party Advisory () http://www.debian.org/security/2011/dsa-2371 - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/887409 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/887409 - Third Party Advisory, US Government Resource
References () http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-1807.html - Not Applicable () http://www.redhat.com/support/errata/RHSA-2011-1807.html - Not Applicable
References () http://www.redhat.com/support/errata/RHSA-2011-1811.html - Not Applicable, Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2011-1811.html - Not Applicable, Third Party Advisory
References () http://www.securityfocus.com/bid/50992 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/50992 - Third Party Advisory, VDB Entry
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 - Release Notes () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 - Release Notes
References () http://www.ubuntu.com/usn/USN-1315-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1315-1 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=747726 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=747726 - Issue Tracking

20 Dec 2023, 18:29

Type Values Removed Values Added
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-1807.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-1807.html - Not Applicable
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html - Mailing List, Third Party Advisory
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html - Mailing List, Third Party Advisory
References (OSVDB) http://osvdb.org/77595 - (OSVDB) http://osvdb.org/77595 - Broken Link
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21660640 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21660640 - Broken Link
References (SECUNIA) http://secunia.com/advisories/47193 - (SECUNIA) http://secunia.com/advisories/47193 - Not Applicable
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=747726 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=747726 - Issue Tracking
References (SLACKWARE) http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 - (SLACKWARE) http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 - Release Notes
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2015-0698.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2015-0698.html - Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2011/dsa-2371 - (DEBIAN) http://www.debian.org/security/2011/dsa-2371 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/50992 - (BID) http://www.securityfocus.com/bid/50992 - Third Party Advisory, VDB Entry
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html - Mailing List, Third Party Advisory
References (CERT-VN) http://www.kb.cert.org/vuls/id/887409 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/887409 - Third Party Advisory, US Government Resource
References (SECUNIA) http://secunia.com/advisories/47353 - (SECUNIA) http://secunia.com/advisories/47353 - Not Applicable
References (UBUNTU) http://www.ubuntu.com/usn/USN-1315-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1315-1 - Third Party Advisory
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html - Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-1811.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-1811.html - Not Applicable, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/47306 - (SECUNIA) http://secunia.com/advisories/47306 - Not Applicable
CWE CWE-119 CWE-787
First Time Oracle
Oracle outside In Technology
Fedoraproject fedora
Fedoraproject
Canonical ubuntu Linux
Debian debian Linux
Suse linux Enterprise Software Development Kit
Canonical
Suse linux Enterprise Desktop
Suse linux Enterprise Server
Suse
Debian
CPE cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.3.7:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.3.5:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*

Information

Published : 2011-12-15 03:57

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4516

Mitre link : CVE-2011-4516

CVE.ORG link : CVE-2011-4516


JSON object : View

Products Affected

suse

  • linux_enterprise_software_development_kit
  • linux_enterprise_server
  • linux_enterprise_desktop

canonical

  • ubuntu_linux

jasper_project

  • jasper

oracle

  • outside_in_technology

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-787

Out-of-bounds Write