First published: Mon Nov 28 2016(Updated: )
A heap-buffer overflow vulnerability was found in QMFB code in JPC codec caused by buffer being allocated with too small size. Upstream bugs: <a href="https://github.com/mdadams/jasper/issues/93">https://github.com/mdadams/jasper/issues/93</a> <a href="https://github.com/mdadams/jasper/issues/94">https://github.com/mdadams/jasper/issues/94</a> Upstream patch: <a href="https://github.com/mdadams/jasper/commit/4a59cfaf9ab3d48fca4a15c0d2674bf7138e3d1a">https://github.com/mdadams/jasper/commit/4a59cfaf9ab3d48fca4a15c0d2674bf7138e3d1a</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jasper | ||
redhat/jasper | <2.0.0 | 2.0.0 |
Jasper Reports | <2.0.0 | |
Debian GNU/Linux | =8.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8654 has a high severity rating due to the potential for remote code execution caused by the heap-buffer overflow.
To fix CVE-2016-8654, update the jasper package to version 2.0.0 or later.
CVE-2016-8654 affects the jasper library, especially in versions prior to 2.0.0 on systems such as Debian and Red Hat.
Yes, CVE-2016-8654 can be exploited remotely, allowing attackers to execute arbitrary code on vulnerable systems.
CVE-2016-8654 is caused by a buffer being allocated with too small a size in the QMFB code of the JPC codec.