First published: Mon Nov 21 2016(Updated: )
An integer overflow in jpc_dec_process_siz was found that can be triggered by crafted image file when given as input to imginfo Upstream patch: <a href="https://github.com/mdadams/jasper/commit/d91198abd00fc435a397fe6bad906a4c1748e9cf">https://github.com/mdadams/jasper/commit/d91198abd00fc435a397fe6bad906a4c1748e9cf</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q4/441">http://seclists.org/oss-sec/2016/q4/441</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jasper | ||
redhat/jasper | <1.900.13 | 1.900.13 |
Jasper Reports | <=1.900.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9387 has a moderate severity level due to the potential for integer overflow vulnerabilities.
To remediate CVE-2016-9387, update the Jasper package to version 1.900.13 or later.
CVE-2016-9387 affects Jasper versions up to 1.900.12.
Yes, CVE-2016-9387 can be exploited by processing a crafted image file.
Yes, an upstream patch for CVE-2016-9387 has been made available to address the vulnerability.