← Zuruck zu CVEs
CVE-2014-8138
N/ABeschreibung
Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht12/24/2014
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
jasper_project:jasperredhat:enterprise_linux
Schwachen (CWE)
CWE-119
Referenzen
http://advisories.mageia.org/MGASA-2014-0539.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html(secalert@redhat.com)
http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-2021.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-0698.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-1713.html(secalert@redhat.com)
http://secunia.com/advisories/61747(secalert@redhat.com)
http://secunia.com/advisories/62311(secalert@redhat.com)
http://secunia.com/advisories/62615(secalert@redhat.com)
http://secunia.com/advisories/62619(secalert@redhat.com)
http://www.debian.org/security/2014/dsa-3106(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2015:012(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2015:159(secalert@redhat.com)
http://www.securityfocus.com/bid/71746(secalert@redhat.com)
http://www.securitytracker.com/id/1033459(secalert@redhat.com)
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-2483-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-2483-2(secalert@redhat.com)
https://www.ocert.org/advisories/ocert-2014-012.html(secalert@redhat.com)
http://advisories.mageia.org/MGASA-2014-0539.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-2021.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-0698.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1713.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61747(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/62311(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/62615(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/62619(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-3106(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2015:012(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2015:159(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/71746(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1033459(af854a3a-2127-422b-91ae-364da2661108)
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2483-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2483-2(af854a3a-2127-422b-91ae-364da2661108)
https://www.ocert.org/advisories/ocert-2014-012.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.