First published: Thu Oct 20 2011(Updated: )
Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jasper | <1.900.5 | 1.900.5 |
Jasper Reports | =1.900.1 | |
Oracle Outside In Technology | =8.3.5 | |
Oracle Outside In Technology | =8.3.7 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Debian | =6.0 | |
Fedora | =15 | |
Fedora | =16 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
suse linux enterprise server vmware | =11-sp1 | |
SUSE Linux Enterprise Software Development Kit | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4516 is considered a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2011-4516, upgrade to the Jasper package version 1.900.5 or later.
CVE-2011-4516 affects Jasper version 1.900.1 and various versions of Oracle's Outside In Technology and multiple versions of Ubuntu and Debian.
CVE-2011-4516 can be exploited by remote attackers using specially crafted JPEG2000 files.
Exploitation of CVE-2011-4516 can lead to arbitrary code execution or denial of service due to memory corruption.