Page 3 of 19 results (0.013 seconds)

CVSS: 7.0EPSS: 0%CPEs: 10EXPL: 1

JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer. JasPer, en versiones anteriores a la 2.0.12, es vulnerable a un uso de memoria previamente liberada en la forma en la que descifra ciertos archivos de imagen JPEG 2000. Esto resulta en un cierre inesperado de la aplicación que esté usando JasPer. A use-after-free flaw was found in the way JasPer, before version 2.0.12, decode certain JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash. • http://www.securityfocus.com/bid/94952 https://access.redhat.com/errata/RHSA-2017:1208 https://bugzilla.redhat.com/show_bug.cgi?id=1406405 https://security.gentoo.org/glsa/201707-07 https://www.debian.org/security/2017/dsa-3827 https://access.redhat.com/security/cve/CVE-2016-9591 • CWE-416: Use After Free •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer. La función jpc_bitstream_getbits en jpc_bs.c en JasPer en versiones anteriores a 2.0.10 permite a atacantes remotos provocar una denegación de servicio (fallo de aserción) a través de un entero muy grande. • http://www.openwall.com/lists/oss-security/2016/11/17/1 http://www.securityfocus.com/bid/94371 https://access.redhat.com/errata/RHSA-2017:1208 https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure https://bugzilla.redhat.com/show_bug.cgi?id=1396967 https://github.com/mdadams/jasper/commit/1e84674d95353c64e5c4c0e7232ae86fd6ea813b https://usn.ubuntu.com/3693-1 https://access.redhat.com/security/cve/CVE-2016-9391 • CWE-617: Reachable Assertion •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The jas_matrix_asl function in jas_seq.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted image. La función jas_matrix_asl en jas_seq.c en JasPer 1.900.27 permite a atacantes provocar una denegación de servicio (lectura de memoria no válida y caída) a través de una imagen manipulada. • http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html http://www.openwall.com/lists/oss-security/2017/01/16/5 http://www.openwall.com/lists/oss-security/2017/01/17/4 http://www.securityfocus.com/bid/95687 https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-read-in-jas_matrix_asl-jas_seq-c https://security.gentoo.org/glsa/201908-03 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Heap-based buffer overflow in the jpc_dec_decodepkt function in jpc_t2dec.c in JasPer 2.0.10 allows remote attackers to have unspecified impact via a crafted image. Desbordamiento de búfer basado en memoria dinámica en la función jpc_dec_decodepkt en jpc_t2dec.c en JasPer 2.0.10 permite a atacantes remotos tener un impacto no especificado a través de una imagen manipulada. • https://blogs.gentoo.org/ago/2017/01/25/jasper-heap-based-buffer-overflow-in-jpc_dec_decodepkt-jpc_t2dec-c https://github.com/mdadams/jasper/issues/114 https://security.gentoo.org/glsa/201908-03 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The jas_matrix_bindsub function in jas_seq.c in JasPer 2.0.10 allows remote attackers to cause a denial of service (invalid read) via a crafted image. La función jas_matrix_bindsub en jas_seq.c en JasPer 2.0.10 permite a atacantes remotos provocar una denegación de servicio (lectura no válida) a través de una imagen manipulada. • https://blogs.gentoo.org/ago/2017/01/25/jasper-invalid-memory-read-in-jas_matrix_bindsub-jas_seq-c https://github.com/mdadams/jasper/issues/113 https://security.gentoo.org/glsa/201908-03 • CWE-125: Out-of-bounds Read •