First published: Thu Dec 15 2011(Updated: )
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jasper Reports | =1.900.1 | |
Oracle Outside In Technology | =8.3.5 | |
Oracle Outside In Technology | =8.3.7 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Ubuntu Linux | =11.04 | |
Ubuntu Linux | =11.10 | |
Debian | =6.0 | |
Fedora | =15 | |
Fedora | =16 | |
SUSE Linux Enterprise Desktop | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Software Development Kit | =11-sp1 | |
Red Hat Enterprise Linux Desktop | =4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4517 has a critical severity level due to the potential for remote code execution and denial of service.
To remediate CVE-2011-4517, upgrade to a patched version of Jasper or any affected software that addresses this vulnerability.
CVE-2011-4517 affects Jasper 1.900.1, Oracle Outside In Technology versions 8.3.5 and 8.3.7, and several versions of Ubuntu and Debian operating systems.
CVE-2011-4517 can lead to heap-based buffer overflow vulnerabilities, enabling attackers to execute arbitrary code.
There is no current information indicating active exploitation of CVE-2011-4517, but organizations are advised to apply patches promptly.