6.8

CVE-2011-4517

The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.

Data is provided by the National Vulnerability Database (NVD)
Jasper ProjectJasper Version1.900.1
OracleOutside In Technology Version8.3.5
OracleOutside In Technology Version8.3.7
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version10.10
CanonicalUbuntu Linux Version11.04
CanonicalUbuntu Linux Version11.10
DebianDebian Linux Version6.0
FedoraprojectFedora Version15
FedoraprojectFedora Version16
SuseLinux Enterprise Desktop Version11 Updatesp1
SuseLinux Enterprise Server Version11 Updatesp1 SwPlatform-
SuseLinux Enterprise Server Version11 Updatesp1 SwPlatformvmware
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 42.13% 0.971
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

http://www.kb.cert.org/vuls/id/887409
Third Party Advisory
US Government Resource