Integer overflow in the jpcpinextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.
{
"binaries": [
{
"binary_name": "libjasper-dev",
"binary_version": "1.900.1-14ubuntu3.4"
},
{
"binary_name": "libjasper-runtime",
"binary_version": "1.900.1-14ubuntu3.4"
},
{
"binary_name": "libjasper1",
"binary_version": "1.900.1-14ubuntu3.4"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "libjasper-dev",
"binary_version": "1.900.1-debian1-2.4ubuntu1.1"
},
{
"binary_name": "libjasper-runtime",
"binary_version": "1.900.1-debian1-2.4ubuntu1.1"
},
{
"binary_name": "libjasper1",
"binary_version": "1.900.1-debian1-2.4ubuntu1.1"
}
],
"availability": "No subscription required"
}