296,733
Total vulnerabilities in the database
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
| Software | From | Fixed in |
|---|---|---|
| jasper_project / jasper | 1.900.1 | 1.900.1.x |
| suse / linux_enterprise_server | 11-sp1 | 11-sp1.x |
| fedoraproject / fedora | 16 | 16.x |
| canonical / ubuntu_linux | 10.10 | 10.10.x |
| suse / linux_enterprise_desktop | 11-sp1 | 11-sp1.x |
| canonical / ubuntu_linux | 11.04 | 11.04.x |
| canonical / ubuntu_linux | 11.10 | 11.10.x |
| debian / debian_linux | 6.0 | 6.0.x |
| fedoraproject / fedora | 15 | 15.x |
| canonical / ubuntu_linux | 10.04 | 10.04.x |
| suse / linux_enterprise_software_development_kit | 11-sp1 | 11-sp1.x |
| oracle / outside_in_technology | 8.3.5 | 8.3.5.x |
| oracle / outside_in_technology | 8.3.7 | 8.3.7.x |
| redhat / enterprise_linux_desktop | 4 | 4.x |