← Volver a CVEs
CVE-2014-8137
N/ADescripcion
Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado12/24/2014
Ultima modificacion4/12/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
jasper_project:jasperredhat:enterprise_linux
Referencias
http://advisories.mageia.org/MGASA-2014-0539.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html(secalert@redhat.com)
http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-2021.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-0698.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-1713.html(secalert@redhat.com)
http://secunia.com/advisories/61747(secalert@redhat.com)
http://secunia.com/advisories/62311(secalert@redhat.com)
http://secunia.com/advisories/62615(secalert@redhat.com)
http://secunia.com/advisories/62619(secalert@redhat.com)
http://www.debian.org/security/2014/dsa-3106(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2015:012(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2015:159(secalert@redhat.com)
http://www.securityfocus.com/bid/71742(secalert@redhat.com)
http://www.securitytracker.com/id/1033459(secalert@redhat.com)
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-2483-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-2483-2(secalert@redhat.com)
https://www.ocert.org/advisories/ocert-2014-012.html(secalert@redhat.com)
http://advisories.mageia.org/MGASA-2014-0539.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-2021.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-0698.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1713.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61747(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/62311(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/62615(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/62619(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-3106(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2015:012(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2015:159(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/71742(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1033459(af854a3a-2127-422b-91ae-364da2661108)
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2483-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2483-2(af854a3a-2127-422b-91ae-364da2661108)
https://www.ocert.org/advisories/ocert-2014-012.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.