First published: Thu Jul 13 2017(Updated: )
JasPer 2.0.12 is vulnerable to a NULL pointer exception in the function jp2_encode which failed to check to see if the image contained at least one component resulting in a denial-of-service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jasper | <2.0.13 | 2.0.13 |
debian/jasper | ||
Jasper Reports | =2.0.12 | |
Fedora | =32 | |
Fedora | =33 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000050 is considered a medium severity vulnerability due to its potential to cause a denial-of-service.
To fix CVE-2017-1000050, upgrade to JasPer version 2.0.13 or later.
CVE-2017-1000050 affects JasPer version 2.0.12 and earlier.
There is no direct indication that CVE-2017-1000050 can be exploited remotely as it typically requires local access to trigger the vulnerability.
CVE-2017-1000050 enables denial-of-service attacks due to a NULL pointer exception.