GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Dec 16, 2008 10:26 pm Post subject: [ GLSA 200812-18 ] JasPer: User-assisted execution of arbitr |
|
|
Gentoo Linux Security Advisory
Title: JasPer: User-assisted execution of arbitrary code (GLSA 200812-18)
Severity: normal
Exploitable: remote
Date: December 16, 2008
Bug(s): #222819
ID: 200812-18
Synopsis
Multiple memory management errors in JasPer might lead to execution of
arbitrary code via jpeg2k files.
Background
The JasPer Project is an open-source initiative to provide a free
software-based reference implementation of the codec specified in the
JPEG-2000 Part-1 (jpeg2k) standard.
Affected Packages
Package: media-libs/jasper
Vulnerable: < 1.900.1-r3
Unaffected: >= 1.900.1-r3
Architectures: All supported architectures
Description
Marc Espie and Christian Weisgerber have discovered multiple
vulnerabilities in JasPer:
-
Multiple integer overflows might allow for insufficient memory
allocation, leading to heap-based buffer overflows (CVE-2008-3520).
-
The jas_stream_printf() function in libjasper/base/jas_stream.c uses
vsprintf() to write user-provided data to a static to a buffer, leading
to an overflow (CVE-2008-3522).
Impact
Remote attackers could entice a user or automated system to process
specially crafted jpeg2k files with an application using JasPer,
possibly leading to the execution of arbitrary code.
Workaround
There is no known workaround at this time.
Resolution
All JasPer users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/jasper-1.900.1-r3" |
References
CVE-2008-3520
CVE-2008-3522
Last edited by GLSA on Fri Nov 06, 2009 4:27 am; edited 2 times in total |
|