First published: Thu Nov 24 2016(Updated: )
An integer overflow vulnerability was found in jasper in jas_image.c triggered by parsing of a maliciously crafted file. Upstream patch: <a href="https://github.com/mdadams/jasper/commit/d42b2388f7f8e0332c846675133acea151fc557a">https://github.com/mdadams/jasper/commit/d42b2388f7f8e0332c846675133acea151fc557a</a> References: <a href="http://seclists.org/oss-sec/2016/q4/470">http://seclists.org/oss-sec/2016/q4/470</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jasper | <1.900.25 | 1.900.25 |
Jasper Reports | <=1.900.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9557 is considered a high severity vulnerability due to its potential for integer overflow leading to code execution.
To fix CVE-2016-9557, upgrade to jasper version 1.900.25 or later.
CVE-2016-9557 affects systems using jasper versions up to 1.900.24 and specifically those built by Red Hat.
CVE-2016-9557 is caused by an integer overflow in jasper when parsing a maliciously crafted file.
Yes, CVE-2016-9557 can potentially be exploited remotely by opening a specially crafted file.