First published: Wed Oct 26 2016(Updated: )
Integer overflow in the jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.12 allows remote attackers to have unspecified impact via a crafted image file, which triggers a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jasper | ||
redhat/jasper | <1.900.12 | 1.900.12 |
Jasper Reports | <=1.900.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10249 has a high severity due to its potential for causing a heap-based buffer overflow which can lead to remote code execution.
To fix CVE-2016-10249, upgrade the JasPer library to version 1.900.12 or later.
CVE-2016-10249 allows remote attackers to exploit an integer overflow vulnerability, leading to a possible denial of service or arbitrary code execution.
CVE-2016-10249 affects the JasPer library, specifically versions prior to 1.900.12.
There are no effective workarounds for CVE-2016-10249; updating JasPer is the recommended solution.