Page 8 of 69 results (0.011 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The jp2_colr_destroy function in jp2_cod.c in JasPer before 1.900.13 allows remote attackers to cause a denial of service (NULL pointer dereference) by leveraging incorrect cleanup of JP2 box data on error. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8887. La función jp2_colr_destroy en jp2_cod.c en JasPer en versiones anteriores a 1.900.13 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero NULL) aprovechando la limpieza incorrecta de datos de la caja JP2 en caso de error. NOTA: esta vulnerabilidad existe debido a una corrección incompleta para CVE-2016-8887. • https://blogs.gentoo.org/ago/2016/10/23/jasper-null-pointer-dereference-in-jp2_colr_destroy-jp2_cod-c-incomplete-fix-for-cve-2016-8887 https://github.com/mdadams/jasper/commit/bdfe95a6e81ffb4b2fad31a76b57943695beed20 https://usn.ubuntu.com/3693-1 • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Heap-based buffer overflow in the jpc_dec_decodepkt function in jpc_t2dec.c in JasPer 2.0.10 allows remote attackers to have unspecified impact via a crafted image. Desbordamiento de búfer basado en memoria dinámica en la función jpc_dec_decodepkt en jpc_t2dec.c en JasPer 2.0.10 permite a atacantes remotos tener un impacto no especificado a través de una imagen manipulada. • https://blogs.gentoo.org/ago/2017/01/25/jasper-heap-based-buffer-overflow-in-jpc_dec_decodepkt-jpc_t2dec-c https://github.com/mdadams/jasper/issues/114 https://security.gentoo.org/glsa/201908-03 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The jas_matrix_bindsub function in jas_seq.c in JasPer 2.0.10 allows remote attackers to cause a denial of service (invalid read) via a crafted image. La función jas_matrix_bindsub en jas_seq.c en JasPer 2.0.10 permite a atacantes remotos provocar una denegación de servicio (lectura no válida) a través de una imagen manipulada. • https://blogs.gentoo.org/ago/2017/01/25/jasper-invalid-memory-read-in-jas_matrix_bindsub-jas_seq-c https://github.com/mdadams/jasper/issues/113 https://security.gentoo.org/glsa/201908-03 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The jpc_tsfb_synthesize function in jpc_tsfb.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) via vectors involving an empty sequence. La función jpc_tsfb_synthesize en jpc_tsfb.c en JasPer en versiones anteriores a 1.900.9 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero NULL) a través de vectores que implican una secuencia vacía. • http://www.securityfocus.com/bid/93797 https://access.redhat.com/errata/RHSA-2017:1208 https://blogs.gentoo.org/ago/2016/10/20/jasper-null-pointer-dereference-in-jpc_tsfb_synthesize-jpc_tsfb-c https://github.com/mdadams/jasper/commit/2e82fa00466ae525339754bb3ab0a0474a31d4bd https://usn.ubuntu.com/3693-1 https://access.redhat.com/security/cve/CVE-2016-10248 https://bugzilla.redhat.com/show_bug.cgi?id=1434447 • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Integer overflow in the jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.12 allows remote attackers to have unspecified impact via a crafted image file, which triggers a heap-based buffer overflow. Desbordamiento de entero en la función jpc_dec_tiledecode en jpc_dec.c en JasPer en versiones anteriores a 1.900.12 permite a atacantes remotos tener un impacto no especificado a través de un archivo de imagen manipulado, lo que desencadena un desbordamiento de búfer basado en memoria dinámica. • http://www.debian.org/security/2017/dsa-3827 http://www.securityfocus.com/bid/93838 https://access.redhat.com/errata/RHSA-2017:1208 https://blogs.gentoo.org/ago/2016/10/23/jasper-heap-based-buffer-overflow-in-jpc_dec_tiledecode-jpc_dec-c https://github.com/mdadams/jasper/commit/988f8365f7d8ad8073b6786e433d34c553ecf568 https://access.redhat.com/security/cve/CVE-2016-10249 https://bugzilla.redhat.com/show_bug.cgi?id=1388840 • CWE-122: Heap-based Buffer Overflow CWE-190: Integer Overflow or Wraparound •