Joined: 12 May 2004
|Posted: Tue Dec 16, 2008 10:26 pm Post subject: [ GLSA 200812-18 ] JasPer: User-assisted execution of arbitr
|Gentoo Linux Security Advisory
Title: JasPer: User-assisted execution of arbitrary code (GLSA 200812-18)
Date: December 16, 2008
Multiple memory management errors in JasPer might lead to execution of
arbitrary code via jpeg2k files.
The JasPer Project is an open-source initiative to provide a free
software-based reference implementation of the codec specified in the
JPEG-2000 Part-1 (jpeg2k) standard.
Vulnerable: < 1.900.1-r3
Unaffected: >= 1.900.1-r3
Architectures: All supported architectures
Marc Espie and Christian Weisgerber have discovered multiple
vulnerabilities in JasPer:
Multiple integer overflows might allow for insufficient memory
allocation, leading to heap-based buffer overflows (CVE-2008-3520).
The jas_stream_printf() function in libjasper/base/jas_stream.c uses
vsprintf() to write user-provided data to a static to a buffer, leading
to an overflow (CVE-2008-3522).
Remote attackers could entice a user or automated system to process
specially crafted jpeg2k files with an application using JasPer,
possibly leading to the execution of arbitrary code.
There is no known workaround at this time.
All JasPer users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/jasper-1.900.1-r3"
Last edited by GLSA on Fri Nov 06, 2009 4:27 am; edited 2 times in total