SB2016102423 - Fedora 25 update for jasper



SB2016102423 - Fedora 25 update for jasper

Published: October 24, 2016 Updated: April 24, 2025

Security Bulletin ID SB2016102423
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Medium 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) NULL pointer dereference (CVE-ID: CVE-2016-8690)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted BMP image in an imginfo command.


2) Division by zero (CVE-ID: CVE-2016-8691)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to divide-by-zero error within The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4. A remote attacker can perform a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.


3) Division by zero (CVE-ID: CVE-2016-8692)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to divide-by-zero error within The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4. A remote attacker can perform a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.


4) Double Free (CVE-ID: CVE-2016-8693)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.


Remediation

Install update from vendor's website.