[arch-security] [ASA-201501-23] jasper: arbitrary code execution
Arch Linux Security Advisory ASA-201501-23 ========================================== Severity: Critical Date : 2015-01-27 CVE-ID : CVE-2014-8157 CVE-2014-8158 Package : jasper Type : arbitrary code execution Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package jasper before version 1.900.1-13 is vulnerable to heap and stack based buffer overflows leading to arbitrary code execution. Resolution ========== Upgrade to 1.900.1-13. # pacman -Syu "jasper>=1.900.1-13" The problems have not been fixed upstream but patches were applied. Workaround ========== None. Description =========== - CVE-2014-8157 (arbitrary code execution) Off-by-one error in the jpc_dec_process_sot function allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow. - CVE-2014-8158 (arbitrary code execution) Multiple stack-based buffer overflows in jpc_qmfb.c allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image. Impact ====== A remote attacker is able to create a specially crafted JPEG 2000 image that is leading to arbitrary code execution. References ========== https://www.ocert.org/advisories/ocert-2015-001.html https://bugs.archlinux.org/task/43592 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8157 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8158
participants (1)
-
Levente Polyak