First published: Thu Nov 10 2016(Updated: )
A number of overflows were found in jasper causing use after free vulnerability triggeerd by creafted image. Upstream patch: <a href="https://github.com/mdadams/jasper/commit/634ce8e8a5accc0fa05dd2c20d42b4749d4b2735">https://github.com/mdadams/jasper/commit/634ce8e8a5accc0fa05dd2c20d42b4749d4b2735</a> Reproducer: <a href="https://github.com/asarubbo/poc/blob/master/00028-jasper-uaf-jas_realloc">https://github.com/asarubbo/poc/blob/master/00028-jasper-uaf-jas_realloc</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q4/385">http://seclists.org/oss-sec/2016/q4/385</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jasper | ||
redhat/jasper | <1.900.22 | 1.900.22 |
Jasper Reports | <=1.900.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9262 is classified as a moderate severity vulnerability due to the potential for use after free exploitation.
To fix CVE-2016-9262, users should upgrade to jasper version 1.900.22 or later on Red Hat systems.
CVE-2016-9262 affects the jasper image processing software across various distributions including Debian and Red Hat.
Exploitation of CVE-2016-9262 could lead to arbitrary code execution and system compromise through crafted images.
Yes, a patch for CVE-2016-9262 is included in jasper version 1.900.22 and later.