Page 18 of 98 results (0.013 seconds)

CVSS: 7.6EPSS: 3%CPEs: 4EXPL: 0

Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137. Vulnerabilidad de liberación doble en la función jas_iccattrval_destroy en JasPer 1.900.1 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (caída) o posiblemente ejecutar código arbitrario a través de un perfil de color ICC en un archivo de imagen JPEG 2000, una vulnerabilidad diferente a CVE-2014-8137. • http://www.debian.org/security/2016/dsa-3508 http://www.openwall.com/lists/oss-security/2016/03/03/12 http://www.securityfocus.com/bid/84133 http://www.ubuntu.com/usn/USN-2919-1 https://access.redhat.com/errata/RHSA-2017:1208 https://bugs.launchpad.net/ubuntu/+source/jasper/+bug/1547865 https://access.redhat.com/security/cve/CVE-2016-1577 https://bugzilla.redhat.com/show_bug.cgi?id=1314466 • CWE-416: Use After Free •

CVSS: 6.5EPSS: 2%CPEs: 1EXPL: 0

The jas_matrix_clip function in jas_seq.c in JasPer 1.900.1 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted JPEG 2000 image. La función jas_matrix_clip en jas_seq.c en JasPer 1.900.1 permite a atacantes remotos causar una denegación de servicio (lectura inválida y caída de aplicación) a través de una imagen JPEG 2000 manipulada. • http://lists.opensuse.org/opensuse-updates/2016-02/msg00060.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00063.html http://www.debian.org/security/2016/dsa-3508 http://www.openwall.com/lists/oss-security/2016/01/28/4 http://www.openwall.com/lists/oss-security/2016/01/28/6 http://www.securityfocus.com/bid/83108 https://access.redhat.com/errata/RHSA-2017:1208 https://access.redhat.com/security/cve/CVE-2016-2089 https://bugzilla.redhat.com/show_bug.c • CWE-20: Improper Input Validation CWE-476: NULL Pointer Dereference •

CVSS: 6.5EPSS: 1%CPEs: 1EXPL: 0

The jpc_pi_nextcprl function in JasPer 1.900.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image. La función jpc_pi_nextcprl en JasPer 1.900.1 permite a atacantes remotos provocar una denegación de servicio (lectura fuera de rango y caída de aplicación) a través de una imagen JPEG 2000 manipulada. • http://www.debian.org/security/2017/dsa-3785 http://www.openwall.com/lists/oss-security/2016/01/13/2 http://www.openwall.com/lists/oss-security/2016/01/13/6 http://www.securityfocus.com/bid/81488 https://access.redhat.com/errata/RHSA-2017:1208 https://access.redhat.com/security/cve/CVE-2016-1867 https://bugzilla.redhat.com/show_bug.cgi?id=1298135 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 6.8EPSS: 7%CPEs: 6EXPL: 0

Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image. Múltiples desbordamientos de buffer basado en pila en jpc_qmfb.c en JasPer 1.900.1 y anteriores permiten a atacantes remotos causar una denegación de servicio (caída) o posiblemente ejecutar código arbitrario a través de una imagen JPEG 2000 manipulada. An unrestricted stack memory use flaw was found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. • http://advisories.mageia.org/MGASA-2015-0038.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html http://rhn.redhat.com/errata/RHSA-2015-0074.html http://rhn.redhat.com/errata/RHSA-2015-0698.html http://secunia.com/advisories/62583 http://secunia.com/advisories/62615 http://secunia.com/advisories/62619 http://secunia.com/advisories/62765 http://www.debian.org/security/2015/dsa-3138 http://www.mandriva.com/security/advisories?name=MDVSA-2015:034 http:/&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.5EPSS: 9%CPEs: 6EXPL: 0

Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow. Error de superación de límite (off-by-one) en la función jpc_dec_process_sot en JasPer 1.900.1 y anteriores permite a atacantes remotos causar una denegación de servicio (caída) o posiblemente ejecutar código arbitrario a través de una imagen JPEG 2000 manipulada, lo que provoca un desbordamiento de buffer basado en memoria dinámica. An off-by-one flaw, leading to a heap-based buffer overflow, was found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. • http://advisories.mageia.org/MGASA-2015-0038.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html http://rhn.redhat.com/errata/RHSA-2015-0074.html http://rhn.redhat.com/errata/RHSA-2015-0698.html http://secunia.com/advisories/62583 http://secunia.com/advisories/62615 http://secunia.com/advisories/62619 http://secunia.com/advisories/62765 http://www.debian.org/security/2015/dsa-3138 http://www.mandriva.com/security/advisories?name=MDVSA-2015:034 http:/&# • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •