First published: Thu Oct 02 2008(Updated: )
Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Virtualization | =3.5 | |
Jasper Reports | =1.900.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3522 is considered a high severity vulnerability due to the potential for a buffer overflow.
To fix CVE-2008-3522, update the JasPer library to a patched version that addresses this buffer overflow issue.
CVE-2008-3522 affects JasPer 1.900.1 and specific versions of Red Hat Enterprise Virtualization.
The impact of CVE-2008-3522 may allow context-dependent attackers to execute arbitrary code or crash the affected application.
Yes, there are reports of exploits utilizing the buffer overflow vulnerability in CVE-2008-3522.