First published: Mon Nov 26 2018(Updated: )
An issue was discovered in JasPer 2.0.14. There is a heap-based buffer over-read of size 8 in the function jp2_decode in libjasper/jp2/jp2_dec.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jasper Project Jasper | =2.0.14 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Debian Debian Linux | =8.0 | |
SUSE Linux Enterprise Desktop | =12-sp3 | |
SUSE Linux Enterprise Desktop | =12-sp4 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12-sp1 | |
SUSE Linux Enterprise Server | =12-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19543 is a vulnerability in JasPer 2.0.14 that allows for a heap-based buffer over-read.
The severity of CVE-2018-19543 is high with a CVSS score of 7.8.
JasPer 2.0.14, Ubuntu Linux 14.04 and 16.04, Debian Linux 8.0, and SUSE Linux Enterprise Desktop and Server versions 11-sp3, 11-sp4, 12-sp1, and 12-sp2 are affected.
To fix CVE-2018-19543, update JasPer to version 2.0.15 or later.
You can find more information about CVE-2018-19543 in the following references: [Link 1](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html), [Link 2](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html), [Link 3](https://github.com/mdadams/jasper/issues/182).