CVE-2011-4517
15.12.2011, 03:57
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.Enginsight
| Vendor | Product | Version |
|---|---|---|
| jasper_project | jasper | 1.900.1 |
| oracle | outside_in_technology | 8.3.5 |
| oracle | outside_in_technology | 8.3.7 |
| canonical | ubuntu_linux | 10.04 |
| canonical | ubuntu_linux | 10.10 |
| canonical | ubuntu_linux | 11.04 |
| canonical | ubuntu_linux | 11.10 |
| debian | debian_linux | 6.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| ghostscript |
| ||||||||||
| jasper |
| ||||||||||
| netpbm-free |
|
Common Weakness Enumeration