CVE-2016-9557
https://notcve.org/view.php?id=CVE-2016-9557
Integer overflow in jas_image.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (application crash) via a crafted file. Desbordamiento de entero en jas_image.c en JasPer en versiones anteriores a 1.900.25 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un archivo manipulado. • http://www.openwall.com/lists/oss-security/2016/11/23/2 http://www.securityfocus.com/bid/94490 https://blogs.gentoo.org/ago/2016/11/19/jasper-signed-integer-overflow-in-jas_image-c https://bugzilla.redhat.com/show_bug.cgi?id=1398251 https://github.com/mdadams/jasper/commit/d42b2388f7f8e0332c846675133acea151fc557a • CWE-190: Integer Overflow or Wraparound •
CVE-2016-10251 – jasper: integer overflow in jpc_pi_nextcprl(), leading to out-of-bounds read
https://notcve.org/view.php?id=CVE-2016-10251
Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value. Desbordamiento de entero en la función jpc_pi_nextcprl en jpc_t2cod.c en JasPer en versiones anteriores a 1.900.20 permite a atacantes remotos tener impacto no especificado a través de un archivo manipulado, lo que desencadena el uso de un valor no inicializado. • http://www.debian.org/security/2017/dsa-3827 http://www.securityfocus.com/bid/97584 https://access.redhat.com/errata/RHSA-2017:1208 https://blogs.gentoo.org/ago/2016/11/04/jasper-use-of-uninitialized-value-in-jpc_pi_nextcprl-jpc_t2cod-c https://github.com/mdadams/jasper/commit/1f0dfe5a42911b6880a1445f13f6d615ddb55387 https://www.oracle.com/security-alerts/cpuapr2020.html https://access.redhat.com/security/cve/CVE-2016-10251 https://bugzilla.redhat.com/show_bug.cgi?id=1434461 • CWE-125: Out-of-bounds Read CWE-190: Integer Overflow or Wraparound •
CVE-2017-6852
https://notcve.org/view.php?id=CVE-2017-6852
Heap-based buffer overflow in the jpc_dec_decodepkt function in jpc_t2dec.c in JasPer 2.0.10 allows remote attackers to have unspecified impact via a crafted image. Desbordamiento de búfer basado en memoria dinámica en la función jpc_dec_decodepkt en jpc_t2dec.c en JasPer 2.0.10 permite a atacantes remotos tener un impacto no especificado a través de una imagen manipulada. • https://blogs.gentoo.org/ago/2017/01/25/jasper-heap-based-buffer-overflow-in-jpc_dec_decodepkt-jpc_t2dec-c https://github.com/mdadams/jasper/issues/114 https://security.gentoo.org/glsa/201908-03 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-6851
https://notcve.org/view.php?id=CVE-2017-6851
The jas_matrix_bindsub function in jas_seq.c in JasPer 2.0.10 allows remote attackers to cause a denial of service (invalid read) via a crafted image. La función jas_matrix_bindsub en jas_seq.c en JasPer 2.0.10 permite a atacantes remotos provocar una denegación de servicio (lectura no válida) a través de una imagen manipulada. • https://blogs.gentoo.org/ago/2017/01/25/jasper-invalid-memory-read-in-jas_matrix_bindsub-jas_seq-c https://github.com/mdadams/jasper/issues/113 https://security.gentoo.org/glsa/201908-03 • CWE-125: Out-of-bounds Read •
CVE-2017-6850
https://notcve.org/view.php?id=CVE-2017-6850
The jp2_cdef_destroy function in jp2_cod.c in JasPer before 2.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image. La función jp2_cdef_destroy en jp2_cod.c en JasPer en versiones anteriores a 2.0.13 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero NULL) a través de una imagen manipulada. • https://blogs.gentoo.org/ago/2017/01/25/jasper-null-pointer-dereference-in-jp2_cdef_destroy-jp2_cod-c https://github.com/mdadams/jasper/commit/e96fc4fdd525fa0ede28074a7e2b1caf94b58b0d https://github.com/mdadams/jasper/issues/112 https://usn.ubuntu.com/3693-1 • CWE-476: NULL Pointer Dereference •