ArchLinux: 201412-22: jasper: arbitrary code execution
Summary
- CVE-2014-8137 (arbitrary code execution)
A double free flaw was found in the way JasPer parsed ICC color profiles
in JPEG 2000 image files. A specially crafted file could cause an
application using JasPer to crash or, possibly, execute arbitrary code.
- CVE-2014-9029 (arbitrary code execution)
Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2)
jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and
earlier allow remote attackers to execute arbitrary code via a crafted
jp2 file, which triggers a heap-based buffer overflow.
- CVE-2011-4516 (arbitrary code execution)
Heap-based buffer overflow in the jpc_cox_getcompparms function in
libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to
execute arbitrary code or cause a denial of service (memory corruption)
via a crafted numrlvls value in a coding style default (COD) marker
segment in a JPEG2000 file.
- CVE-2011-4517 (arbitrary code execution)
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer
1.900.1 uses an incorrect data type during a certain size calculation,
which allows remote attackers to trigger a heap-based buffer overflow
and execute arbitrary code, or cause a denial of service (heap memory
corruption), via a crafted component registration (CRG) marker segment
in a JPEG2000 file.
Resolution
Upgrade to 1.900.1-12.
# pacman -Syu "jasper>=1.900.1-12"
The problems have not been fixed upstream but patches were added.
References
https://marc.info/?l=oss-security&m=141770163916268&w=2 https://marc.info/?l=oss-security&m=141891163026757&w=2 https://access.redhat.com/security/cve/CVE-2014-8137 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9029 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4516 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4517 https://bugs.archlinux.org/task/43044 https://bugs.archlinux.org/task/43155
Workaround
None.