CVE-2011-4517

The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html Mailing List Third Party Advisory
http://osvdb.org/77596 Broken Link
http://rhn.redhat.com/errata/RHSA-2015-0698.html Third Party Advisory
http://secunia.com/advisories/47193 Not Applicable
http://secunia.com/advisories/47306 Not Applicable
http://secunia.com/advisories/47353 Not Applicable
http://www-01.ibm.com/support/docview.wss?uid=swg21660640 Broken Link
http://www.debian.org/security/2011/dsa-2371 Third Party Advisory
http://www.kb.cert.org/vuls/id/887409 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1807.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1811.html Third Party Advisory
http://www.securityfocus.com/bid/50992 Broken Link VDB Entry
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 Release Notes
http://www.ubuntu.com/usn/USN-1315-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=747726 Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/71701 Third Party Advisory VDB Entry
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html Mailing List Third Party Advisory
http://osvdb.org/77596 Broken Link
http://rhn.redhat.com/errata/RHSA-2015-0698.html Third Party Advisory
http://secunia.com/advisories/47193 Not Applicable
http://secunia.com/advisories/47306 Not Applicable
http://secunia.com/advisories/47353 Not Applicable
http://www-01.ibm.com/support/docview.wss?uid=swg21660640 Broken Link
http://www.debian.org/security/2011/dsa-2371 Third Party Advisory
http://www.kb.cert.org/vuls/id/887409 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1807.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1811.html Third Party Advisory
http://www.securityfocus.com/bid/50992 Broken Link VDB Entry
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 Release Notes
http://www.ubuntu.com/usn/USN-1315-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=747726 Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/71701 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:outside_in_technology:8.3.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.3.7:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:redhat:enterprise_linux_desktop:4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html - Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html - Mailing List, Third Party Advisory
References () http://osvdb.org/77596 - Broken Link () http://osvdb.org/77596 - Broken Link
References () http://rhn.redhat.com/errata/RHSA-2015-0698.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-0698.html - Third Party Advisory
References () http://secunia.com/advisories/47193 - Not Applicable () http://secunia.com/advisories/47193 - Not Applicable
References () http://secunia.com/advisories/47306 - Not Applicable () http://secunia.com/advisories/47306 - Not Applicable
References () http://secunia.com/advisories/47353 - Not Applicable () http://secunia.com/advisories/47353 - Not Applicable
References () http://www-01.ibm.com/support/docview.wss?uid=swg21660640 - Broken Link () http://www-01.ibm.com/support/docview.wss?uid=swg21660640 - Broken Link
References () http://www.debian.org/security/2011/dsa-2371 - Third Party Advisory () http://www.debian.org/security/2011/dsa-2371 - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/887409 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/887409 - Third Party Advisory, US Government Resource
References () http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-1807.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2011-1807.html - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-1811.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2011-1811.html - Third Party Advisory
References () http://www.securityfocus.com/bid/50992 - Broken Link, VDB Entry () http://www.securityfocus.com/bid/50992 - Broken Link, VDB Entry
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 - Release Notes () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 - Release Notes
References () http://www.ubuntu.com/usn/USN-1315-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1315-1 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=747726 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=747726 - Issue Tracking
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/71701 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/71701 - Third Party Advisory, VDB Entry

20 Dec 2023, 18:29

Type Values Removed Values Added
CPE cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.3.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.3.5:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
First Time Oracle outside In Technology
Fedoraproject
Suse linux Enterprise Desktop
Redhat
Suse linux Enterprise Server
Debian debian Linux
Debian
Redhat enterprise Linux Desktop
Oracle
Fedoraproject fedora
Canonical ubuntu Linux
Suse linux Enterprise Software Development Kit
Canonical
Suse
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-1807.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-1807.html - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21660640 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21660640 - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html - Mailing List, Third Party Advisory
References (CERT-VN) http://www.kb.cert.org/vuls/id/887409 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/887409 - Third Party Advisory, US Government Resource
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html - Mailing List, Third Party Advisory
References (OSVDB) http://osvdb.org/77596 - (OSVDB) http://osvdb.org/77596 - Broken Link
References (BID) http://www.securityfocus.com/bid/50992 - (BID) http://www.securityfocus.com/bid/50992 - Broken Link, VDB Entry
References (SECUNIA) http://secunia.com/advisories/47353 - (SECUNIA) http://secunia.com/advisories/47353 - Not Applicable
References (SECUNIA) http://secunia.com/advisories/47193 - (SECUNIA) http://secunia.com/advisories/47193 - Not Applicable
References (SLACKWARE) http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 - (SLACKWARE) http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 - Release Notes
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2015-0698.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2015-0698.html - Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2011/dsa-2371 - (DEBIAN) http://www.debian.org/security/2011/dsa-2371 - Third Party Advisory
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html - Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-1811.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-1811.html - Third Party Advisory
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html - Mailing List, Third Party Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=747726 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=747726 - Issue Tracking
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/71701 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/71701 - Third Party Advisory, VDB Entry
References (UBUNTU) http://www.ubuntu.com/usn/USN-1315-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1315-1 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/47306 - (SECUNIA) http://secunia.com/advisories/47306 - Not Applicable
CWE CWE-119 CWE-787

Information

Published : 2011-12-15 03:57

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4517

Mitre link : CVE-2011-4517

CVE.ORG link : CVE-2011-4517


JSON object : View

Products Affected

suse

  • linux_enterprise_software_development_kit
  • linux_enterprise_server
  • linux_enterprise_desktop

redhat

  • enterprise_linux_desktop

canonical

  • ubuntu_linux

jasper_project

  • jasper

oracle

  • outside_in_technology

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-787

Out-of-bounds Write