Denial of service in JasPer



Published: 2017-12-10 | Updated: 2018-11-19
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2016-9396
CVE-2017-1000050
CWE-ID CWE-617
CWE-476
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
JasPer
Client/Desktop applications / Multimedia software

Vendor The JasPer Project

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Reachable Assertion

EUVDB-ID: #VU15698

Risk: Low

CVSSv3.1: 3.6 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C]

CVE-ID: CVE-2016-9396

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attacks.

The vulnerability exists due to reachable assertion in JPC_NOMINALGAIN function in jpc/jpc_t1cod.c in JasPer through 2.0.12. A remote attacker can perform a denial of service (DoS) attack via unspecified vectors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

JasPer: 1.701.0 - 2.0.12

External links

http://www.openwall.com/lists/oss-security/2016/11/17/1
http://access.redhat.com/errata/RHSA-2018:3253
http://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure
http://bugzilla.redhat.com/show_bug.cgi?id=1396978
http://bugzilla.redhat.com/show_bug.cgi?id=1485272
http://usn.ubuntu.com/3693-1/
http://github.com/mdadams/jasper/issues/50


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) NULL pointer dereference

EUVDB-ID: #VU15956

Risk: Low

CVSSv3.1: 3.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-1000050

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer exception in the function jp2_encode which failed to check to see if the image contained at least one component. A remote attacker can supply specially crafted input and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

JasPer: 2.0.12

External links

http://www.openwall.com/lists/oss-security/2017/03/06/1
http://www.securityfocus.com/bid/96595
http://access.redhat.com/errata/RHSA-2018:3253
http://access.redhat.com/errata/RHSA-2018:3505


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###