Multiple integer overflows in the (1) jas_realloc function in base/jas_malloc.c and (2) mem_resize function in base/jas_stream.c in JasPer before 1.900.22 allow remote attackers to cause a denial of service via a crafted image, which triggers use after free vulnerabilities.
References
Configurations
History
21 Nov 2024, 03:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2016/11/10/4 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/94224 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2017:1208 - | |
References | () https://blogs.gentoo.org/ago/2016/11/07/jasper-use-after-free-in-jas_realloc-jas_malloc-c - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1393882 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/mdadams/jasper/commit/634ce8e8a5accc0fa05dd2c20d42b4749d4b2735 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201707-07 - | |
References | () https://usn.ubuntu.com/3693-1/ - |
Information
Published : 2017-03-23 18:59
Updated : 2024-11-21 03:00
NVD link : CVE-2016-9262
Mitre link : CVE-2016-9262
CVE.ORG link : CVE-2016-9262
JSON object : View
Products Affected
jasper_project
- jasper
CWE
CWE-190
Integer Overflow or Wraparound