First published: Wed Oct 26 2016(Updated: )
An assert that can be triggered by crafted input file was found in jpc_dec_tiledecode(). Upstream patch: <a href="https://github.com/mdadams/jasper/commit/33cc2cfa51a8d0fc3116d16cc1d8fc581b3f9e8d">https://github.com/mdadams/jasper/commit/33cc2cfa51a8d0fc3116d16cc1d8fc581b3f9e8d</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q4/216">http://seclists.org/oss-sec/2016/q4/216</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jasper | ||
redhat/jasper | <1.900.8 | 1.900.8 |
Jasper Reports | <=1.900.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8883 has been classified as a medium severity vulnerability that can lead to application crashes due to assertion failures.
To remediate CVE-2016-8883, update to Jasper version 1.900.8 or later as it includes the necessary patch.
CVE-2016-8883 affects Jasper versions prior to 1.900.8 across various platforms, including Debian and Red Hat systems.
The exploit for CVE-2016-8883 can be triggered by supplying specially crafted input files to the jpc_dec_tiledecode() function.
CVE-2016-8883 can be considered a local vulnerability as it requires crafted input to trigger the assertion failure.