CVE-2014-8157

Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.
References
Link Resource
http://advisories.mageia.org/MGASA-2015-0038.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html
http://rhn.redhat.com/errata/RHSA-2015-0074.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://secunia.com/advisories/62583
http://secunia.com/advisories/62615
http://secunia.com/advisories/62619
http://secunia.com/advisories/62765
http://www.debian.org/security/2015/dsa-3138
http://www.mandriva.com/security/advisories?name=MDVSA-2015:034
http://www.mandriva.com/security/advisories?name=MDVSA-2015:159
http://www.ocert.org/advisories/ocert-2015-001.html Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/72296
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
http://www.ubuntu.com/usn/USN-2483-1
http://www.ubuntu.com/usn/USN-2483-2
https://bugzilla.redhat.com/show_bug.cgi?id=1179282
http://advisories.mageia.org/MGASA-2015-0038.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html
http://rhn.redhat.com/errata/RHSA-2015-0074.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://secunia.com/advisories/62583
http://secunia.com/advisories/62615
http://secunia.com/advisories/62619
http://secunia.com/advisories/62765
http://www.debian.org/security/2015/dsa-3138
http://www.mandriva.com/security/advisories?name=MDVSA-2015:034
http://www.mandriva.com/security/advisories?name=MDVSA-2015:159
http://www.ocert.org/advisories/ocert-2015-001.html Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/72296
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
http://www.ubuntu.com/usn/USN-2483-1
http://www.ubuntu.com/usn/USN-2483-2
https://bugzilla.redhat.com/show_bug.cgi?id=1179282
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:18

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2015-0038.html - () http://advisories.mageia.org/MGASA-2015-0038.html -
References () http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html - () http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0074.html - () http://rhn.redhat.com/errata/RHSA-2015-0074.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0698.html - () http://rhn.redhat.com/errata/RHSA-2015-0698.html -
References () http://secunia.com/advisories/62583 - () http://secunia.com/advisories/62583 -
References () http://secunia.com/advisories/62615 - () http://secunia.com/advisories/62615 -
References () http://secunia.com/advisories/62619 - () http://secunia.com/advisories/62619 -
References () http://secunia.com/advisories/62765 - () http://secunia.com/advisories/62765 -
References () http://www.debian.org/security/2015/dsa-3138 - () http://www.debian.org/security/2015/dsa-3138 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:034 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:034 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:159 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:159 -
References () http://www.ocert.org/advisories/ocert-2015-001.html - Third Party Advisory, US Government Resource () http://www.ocert.org/advisories/ocert-2015-001.html - Third Party Advisory, US Government Resource
References () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -
References () http://www.securityfocus.com/bid/72296 - () http://www.securityfocus.com/bid/72296 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 -
References () http://www.ubuntu.com/usn/USN-2483-1 - () http://www.ubuntu.com/usn/USN-2483-1 -
References () http://www.ubuntu.com/usn/USN-2483-2 - () http://www.ubuntu.com/usn/USN-2483-2 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1179282 - () https://bugzilla.redhat.com/show_bug.cgi?id=1179282 -

Information

Published : 2015-01-26 15:59

Updated : 2024-11-21 02:18


NVD link : CVE-2014-8157

Mitre link : CVE-2014-8157

CVE.ORG link : CVE-2014-8157


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • enterprise_linux

jasper_project

  • jasper

opensuse

  • opensuse
CWE
CWE-189

Numeric Errors