[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20141218140630.GY32428@core.inversepath.com>
Date: Thu, 18 Dec 2014 15:06:30 +0100
From: Andrea Barisani <lcars@...rt.org>
To: oss-security@...ts.openwall.com, ocert-announce@...ts.ocert.org,
bugtraq@...urityfocus.com
Subject: [oCERT-2014-012] JasPer input sanitization errors
#2014-012 JasPer input sanitization errors
Description:
The JasPer project is an open source implementation for the JPEG-2000 codec.
The library is affected by a double-free vulnerability in function
jas_iccattrval_destroy() as well as a heap-based buffer overflow in function
jp2_decode().
A specially crafted jp2 file, can be used to trigger the vulnerabilities.
Affected version:
JasPer <= 1.900.1
Fixed version:
JasPer, N/A
Credit: vulnerability report received from the Google Security Team.
CVE: CVE-2014-8137 (double-free), CVE-2014-8138 (heap overflow)
Timeline:
2014-12-10: vulnerability report received
2014-12-10: contacted affected vendors
2014-12-10: assigned CVEs
2014-12-18: patch contributed by Tomas Hoger from Red Hat Product Security
2014-12-18: advisory release
References:
http://www.ece.uvic.ca/~frodo/jasper
https://bugzilla.redhat.com/show_bug.cgi?id=1173157
https://bugzilla.redhat.com/show_bug.cgi?id=1173162
Permalink:
http://www.ocert.org/advisories/ocert-2014-012.html
--
Andrea Barisani | Founder & Project Coordinator
oCERT | OSS Computer Security Incident Response Team
<lcars@...rt.org> http://www.ocert.org
0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E
"Pluralitas non est ponenda sine necessitate"
Powered by blists - more mailing lists