[oCERT-2015-001] JasPer input sanitization errors Jan 21 2015 11:28PM
Andrea Barisani (lcars ocert org)

#2015-001 JasPer input sanitization errors


The JasPer project is an open source implementation for the JPEG-2000 codec.

The library is affected by an off-by-one error in a buffer boundary check in
jpc_dec_process_sot(), leading to a heap based buffer overflow, as well as
multiple unrestricted stack memory use issues in jpc_qmfb.c, leading to stack

A specially crafted JPEG-2000 file can be used to trigger the vulnerabilities.

Affected version:

JasPer <= 1.900.1

Fixed version:

JasPer, N/A

Credit: vulnerability report received from <pyddeh (at) gmail (dot) com [email concealed]>.

CVE: CVE-2014-8157 (off-by-one heap buffer overflow),
CVE-2014-8158 (stack overflow)

2015-01-06: vulnerability report received
2015-01-06: contacted affected vendors, assigned CVEs
2015-01-21: advisory release


Andrea Barisani | Founder & Project Coordinator
oCERT | OSS Computer Security Incident Response Team

<lcars (at) ocert (dot) org [email concealed]> http://www.ocert.org
0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E
"Pluralitas non est ponenda sine necessitate"

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus