First published: Tue Nov 25 2014(Updated: )
A heap-based buffer overflow flaw was reported in JasPer's jpc_dec_cp_setfromcox() and jpc_dec_cp_setfromrgn() functions. Processing a specially-crafted image with an application that uses JasPer could cause the application to crash or, potentially, execute arbitrary code. Acknowledgements: Red Hat would like to thank oCERT for reporting these issues. oCERT acknowledges Jose Duart of the Google Security Team as the original reporter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jasper | <1.900.2 | 1.900.2 |
Jasper Reports | <=1.900.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9029 has a high severity due to its potential to execute arbitrary code through a buffer overflow.
To fix CVE-2014-9029, update the JasPer library to version 1.900.2 or later.
CVE-2014-9029 is caused by a heap-based buffer overflow in the jpc_dec_cp_setfromcox() and jpc_dec_cp_setfromrgn() functions of the JasPer library.
Versions of JasPer prior to 1.900.2 are affected by CVE-2014-9029.
The potential impacts of CVE-2014-9029 include application crashes and the execution of arbitrary code.