Integer overflow in the jpcdectiledecode function in jpc_dec.c in JasPer before 1.900.12 allows remote attackers to have unspecified impact via a crafted image file, which triggers a heap-based buffer overflow.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.900.1-14ubuntu3.4", "binary_name": "libjasper-dev" }, { "binary_version": "1.900.1-14ubuntu3.4", "binary_name": "libjasper-runtime" }, { "binary_version": "1.900.1-14ubuntu3.4", "binary_name": "libjasper-runtime-dbgsym" }, { "binary_version": "1.900.1-14ubuntu3.4", "binary_name": "libjasper1" }, { "binary_version": "1.900.1-14ubuntu3.4", "binary_name": "libjasper1-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.900.1-debian1-2.4ubuntu1.1", "binary_name": "libjasper-dev" }, { "binary_version": "1.900.1-debian1-2.4ubuntu1.1", "binary_name": "libjasper-runtime" }, { "binary_version": "1.900.1-debian1-2.4ubuntu1.1", "binary_name": "libjasper-runtime-dbgsym" }, { "binary_version": "1.900.1-debian1-2.4ubuntu1.1", "binary_name": "libjasper1" }, { "binary_version": "1.900.1-debian1-2.4ubuntu1.1", "binary_name": "libjasper1-dbgsym" } ] }