Description
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2371-1 | jasper security update |
Ubuntu USN |
USN-1315-1 | JasPer vulnerabilities |
Ubuntu USN |
USN-1317-1 | Ghostscript vulnerabilities |
References
History
Mon, 21 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Jasper Project
Subscribe
Jasper
Subscribe
Oracle
Subscribe
Outside In Technology
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Rhev Manager
Subscribe
Suse
Subscribe
Linux Enterprise Desktop
Subscribe
Linux Enterprise Server
Subscribe
Linux Enterprise Software Development Kit
Subscribe
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-10-21T16:11:56.211Z
Reserved: 2011-11-22T00:00:00.000Z
Link: CVE-2011-4517
Updated: 2024-08-07T00:09:18.898Z
Status : Deferred
Published: 2011-12-15T03:57:34.277
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-4517
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN