Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2015-9100 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
jasper (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU33249
Risk: Medium
CVSSv3.1: 4.8 [AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2015-9100
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted audio file.
MitigationInstall update from vendor's website.
Vulnerable software versionsjasper (Alpine package): 1.900.1-r9 - 1.900.1-r13
CPE2.3http://git.alpinelinux.org/aports/commit/?id=a050919028df7e95af6ae9babd244b81504363cd
http://git.alpinelinux.org/aports/commit/?id=b4613423f9e2e77ef531c4ee48f860e896f2da1d
http://git.alpinelinux.org/aports/commit/?id=ef6ff77b8dc502dac851b839126109c115bb4326
http://git.alpinelinux.org/aports/commit/?id=ff08de0745689aeee1834062c6ed577d0c3cd1aa
http://git.alpinelinux.org/aports/commit/?id=95ec06e8ff528eb0f8225fe2db60c11035f1a1f5
http://git.alpinelinux.org/aports/commit/?id=c2f9da6f8b698f122868ae47d065ce49d6fbc144
http://git.alpinelinux.org/aports/commit/?id=9a9304220feecc004654c58569762728e8a67104
http://git.alpinelinux.org/aports/commit/?id=1900edcab539a7ab32e3ad868597f7358fa798ad
http://git.alpinelinux.org/aports/commit/?id=22711d8124dcf1724b3b0ae900bf89567c5b979a
http://git.alpinelinux.org/aports/commit/?id=c6826747b05fd69a8385c80f7ba19d2260dd32ba
http://git.alpinelinux.org/aports/commit/?id=7f60893b079de3f360f2d63a76079f32a019f042
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.