CVE-2014-9029

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0514.html
http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html
http://rhn.redhat.com/errata/RHSA-2014-2021.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://secunia.com/advisories/61747
http://secunia.com/advisories/62828
http://www.debian.org/security/2014/dsa-3089
http://www.mandriva.com/security/advisories?name=MDVSA-2014:247
http://www.mandriva.com/security/advisories?name=MDVSA-2015:159
http://www.ocert.org/advisories/ocert-2014-009.html US Government Resource
http://www.openwall.com/lists/oss-security/2014/12/04/9
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/archive/1/534153/100/0/threaded
http://www.securityfocus.com/bid/71476
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
http://www.ubuntu.com/usn/USN-2434-1
http://www.ubuntu.com/usn/USN-2434-2
https://bugzilla.redhat.com/show_bug.cgi?id=1167537
https://exchange.xforce.ibmcloud.com/vulnerabilities/99125
http://advisories.mageia.org/MGASA-2014-0514.html
http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html
http://rhn.redhat.com/errata/RHSA-2014-2021.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://secunia.com/advisories/61747
http://secunia.com/advisories/62828
http://www.debian.org/security/2014/dsa-3089
http://www.mandriva.com/security/advisories?name=MDVSA-2014:247
http://www.mandriva.com/security/advisories?name=MDVSA-2015:159
http://www.ocert.org/advisories/ocert-2014-009.html US Government Resource
http://www.openwall.com/lists/oss-security/2014/12/04/9
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/archive/1/534153/100/0/threaded
http://www.securityfocus.com/bid/71476
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
http://www.ubuntu.com/usn/USN-2434-1
http://www.ubuntu.com/usn/USN-2434-2
https://bugzilla.redhat.com/show_bug.cgi?id=1167537
https://exchange.xforce.ibmcloud.com/vulnerabilities/99125
Configurations

Configuration 1 (hide)

cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:20

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0514.html - () http://advisories.mageia.org/MGASA-2014-0514.html -
References () http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html - () http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html -
References () http://rhn.redhat.com/errata/RHSA-2014-2021.html - () http://rhn.redhat.com/errata/RHSA-2014-2021.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0698.html - () http://rhn.redhat.com/errata/RHSA-2015-0698.html -
References () http://secunia.com/advisories/61747 - () http://secunia.com/advisories/61747 -
References () http://secunia.com/advisories/62828 - () http://secunia.com/advisories/62828 -
References () http://www.debian.org/security/2014/dsa-3089 - () http://www.debian.org/security/2014/dsa-3089 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:247 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:247 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:159 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:159 -
References () http://www.ocert.org/advisories/ocert-2014-009.html - US Government Resource () http://www.ocert.org/advisories/ocert-2014-009.html - US Government Resource
References () http://www.openwall.com/lists/oss-security/2014/12/04/9 - () http://www.openwall.com/lists/oss-security/2014/12/04/9 -
References () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -
References () http://www.securityfocus.com/archive/1/534153/100/0/threaded - () http://www.securityfocus.com/archive/1/534153/100/0/threaded -
References () http://www.securityfocus.com/bid/71476 - () http://www.securityfocus.com/bid/71476 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606 -
References () http://www.ubuntu.com/usn/USN-2434-1 - () http://www.ubuntu.com/usn/USN-2434-1 -
References () http://www.ubuntu.com/usn/USN-2434-2 - () http://www.ubuntu.com/usn/USN-2434-2 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1167537 - () https://bugzilla.redhat.com/show_bug.cgi?id=1167537 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/99125 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/99125 -

Information

Published : 2014-12-08 16:59

Updated : 2024-11-21 02:20


NVD link : CVE-2014-9029

Mitre link : CVE-2014-9029

CVE.ORG link : CVE-2014-9029


JSON object : View

Products Affected

jasper_project

  • jasper
CWE
CWE-189

Numeric Errors