ID CVE-2016-9560
Summary Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.
References
Vulnerable Configurations
  • cpe:2.3:a:jasper_project:jasper:-:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:-:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.2:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.2:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.3:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.3:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.4:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.4:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.5:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.5:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.6:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.6:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.7:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.7:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.8:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.8:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.9:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.9:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.10:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.10:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.11:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.11:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.12:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.12:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.13:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.13:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.14:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.14:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.15:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.15:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.16:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.16:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.17:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.17:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.18:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.18:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.19:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.19:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.20:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.20:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.21:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.21:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.22:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.22:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.23:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.23:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.24:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.24:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.25:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.25:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.26:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.26:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.27:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.27:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.28:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.28:*:*:*:*:*:*:*
  • cpe:2.3:a:jasper_project:jasper:1.900.29:*:*:*:*:*:*:*
    cpe:2.3:a:jasper_project:jasper:1.900.29:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 15-03-2021 - 22:08)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
redhat via4
advisories
rhsa
id RHSA-2017:1208
rpms
  • jasper-0:1.900.1-21.el6_9
  • jasper-0:1.900.1-30.el7_3
  • jasper-debuginfo-0:1.900.1-21.el6_9
  • jasper-debuginfo-0:1.900.1-30.el7_3
  • jasper-devel-0:1.900.1-21.el6_9
  • jasper-devel-0:1.900.1-30.el7_3
  • jasper-libs-0:1.900.1-21.el6_9
  • jasper-libs-0:1.900.1-30.el7_3
  • jasper-utils-0:1.900.1-21.el6_9
  • jasper-utils-0:1.900.1-30.el7_3
refmap via4
bid 94428
confirm https://github.com/mdadams/jasper/commit/1abc2e5a401a4bf1d5ca4df91358ce5df111f495
debian DSA-3785
misc
mlist
  • [oss-security] 20161120 jasper: stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c)
  • [oss-security] 20161122 Re: jasper: stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c)
Last major update 15-03-2021 - 22:08
Published 15-02-2017 - 19:59
Last modified 15-03-2021 - 22:08
Back to Top