Integer overflow in the jpcdectiledecode function in jpc_dec.c in JasPer before 1.900.12 allows remote attackers to have unspecified impact via a crafted image file, which triggers a heap-based buffer overflow.
{ "ubuntu_priority": "medium", "binaries": [ { "binary_name": "libjasper-dev", "binary_version": "1.900.1-14ubuntu3.4" }, { "binary_name": "libjasper-runtime", "binary_version": "1.900.1-14ubuntu3.4" }, { "binary_name": "libjasper-runtime-dbgsym", "binary_version": "1.900.1-14ubuntu3.4" }, { "binary_name": "libjasper1", "binary_version": "1.900.1-14ubuntu3.4" }, { "binary_name": "libjasper1-dbgsym", "binary_version": "1.900.1-14ubuntu3.4" } ], "availability": "No subscription required" }
{ "ubuntu_priority": "medium", "binaries": [ { "binary_name": "libjasper-dev", "binary_version": "1.900.1-debian1-2.4ubuntu1.1" }, { "binary_name": "libjasper-runtime", "binary_version": "1.900.1-debian1-2.4ubuntu1.1" }, { "binary_name": "libjasper-runtime-dbgsym", "binary_version": "1.900.1-debian1-2.4ubuntu1.1" }, { "binary_name": "libjasper1", "binary_version": "1.900.1-debian1-2.4ubuntu1.1" }, { "binary_name": "libjasper1-dbgsym", "binary_version": "1.900.1-debian1-2.4ubuntu1.1" } ], "availability": "No subscription required" }