MEDIUM · 6.8

CVE-2011-4517

The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer ov...

Vulnerability Description

The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
Jasper ProjectJasper1.900.1
OracleOutside In Technology8.3.5
CanonicalUbuntu Linux10.04
DebianDebian Linux6.0
FedoraprojectFedora15
SuseLinux Enterprise Desktop11
SuseLinux Enterprise Server11
SuseLinux Enterprise Software Development Kit11
RedhatEnterprise Linux Desktop4

Related Weaknesses (CWE)

References

FAQ

What is CVE-2011-4517?

CVE-2011-4517 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer ov...

How severe is CVE-2011-4517?

CVE-2011-4517 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2011-4517?

Check the references section above for vendor advisories and patch information. Affected products include: Jasper Project Jasper, Oracle Outside In Technology, Canonical Ubuntu Linux, Debian Debian Linux, Fedoraproject Fedora.