lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20141204140011.GS26336@core.inversepath.com>
Date: Thu, 4 Dec 2014 15:00:11 +0100
From: Andrea Barisani <lcars@...rt.org>
To: oss-security@...ts.openwall.com, ocert-announce@...ts.ocert.org,
  bugtraq@...urityfocus.com
Subject: [oCERT-2014-009] JasPer input sanitization errors


#2014-009 JasPer input sanitization errors

Description:

The JasPer project is an open source implementation for the JPEG-2000 codec.

The library is affected by two heap-based buffer overflows which can lead to
arbitrary code execution. The vulnerability is present in functions
jpc_dec_cp_setfromcox() and jpc_dec_cp_setfromrgn().

A specially crafted jp2 file, can be used to trigger the overflows.

Affected version:

JasPer <= 1.900.1

Fixed version:

JasPer, N/A

Credit: vulnerability report received from the Google Security Team.

CVE: CVE-2014-9029

Timeline:

2014-11-19: vulnerability report received
2014-11-20: contacted affected vendors
2014-11-21: assigned CVE
2014-11-27: patch contributed by Tomas Hoger from Red Hat Product Security
2014-12-04: advisory release

References:
http://www.ece.uvic.ca/~frodo/jasper
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-9029

Permalink:
http://www.ocert.org/advisories/ocert-2014-009.html

-- 
Andrea Barisani |                Founder & Project Coordinator
          oCERT | OSS Computer Security Incident Response Team

<lcars@...rt.org>                         http://www.ocert.org
 0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E
        "Pluralitas non est ponenda sine necessitate"

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ