4.3
CVSSv2

CVE-2016-9591

Published: 09/03/2018 Updated: 09/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer.

Vulnerable Product Search on Vulmon Subscribe to Product

jasper project jasper

redhat enterprise linux server 6.0

redhat enterprise linux server eus 7.4

redhat enterprise linux workstation 6.0

redhat enterprise linux workstation 7.0

redhat enterprise linux desktop 7.0

redhat enterprise linux desktop 6.0

redhat enterprise linux server 7.0

redhat enterprise linux server eus 7.3

debian debian linux 8.0

Vendor Advisories

Synopsis Important: jasper security update Type/Severity Security Advisory: Important Topic An update for jasper is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scor ...
Several security issues were fixed in JasPer ...
Multiple vulnerabilities have been discovered in the JasPer library for processing JPEG-2000 images, which may result in denial of service or the execution of arbitrary code if a malformed image is processed For the stable distribution (jessie), these problems have been fixed in version 19001-debian1-24+deb8u3 We recommend that you upgrade you ...
Multiple flaws were found in the way JasPer decoded JPEG 2000 image files Aspecially crafted file could cause an application using JasPer to crash or,possibly, execute arbitrary code ( CVE-2016-8654, CVE-2016-9560, CVE-2016-10249,CVE-2015-5203, CVE-2015-5221, CVE-2016-1577, CVE-2016-8690, CVE-2016-8693,CVE-2016-8884, CVE-2016-8885, CVE-2016-9262, ...
A heap-use-after-free vulnerability has been found in jasper The vulnerability exists in code responsible for re-encoding the decoded input image file to a J2P image The vulnerability is caused by not setting related pointers to be null after the pointers are freed (ie missing Setting-Pointer-Null operations after free) The vulnerability can f ...