NULL pointer dereference in jasper (Alpine package)



Published: 2017-08-07
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2015-9100
CWE-ID CWE-476
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
jasper (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU33249

Risk: Medium

CVSSv3.1: 4.8 [AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-9100

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted audio file.

Mitigation

Install update from vendor's website.

Vulnerable software versions

jasper (Alpine package): 1.900.1-r9 - 1.900.1-r13

CPE2.3 External links

http://git.alpinelinux.org/aports/commit/?id=a050919028df7e95af6ae9babd244b81504363cd
http://git.alpinelinux.org/aports/commit/?id=b4613423f9e2e77ef531c4ee48f860e896f2da1d
http://git.alpinelinux.org/aports/commit/?id=ef6ff77b8dc502dac851b839126109c115bb4326
http://git.alpinelinux.org/aports/commit/?id=ff08de0745689aeee1834062c6ed577d0c3cd1aa
http://git.alpinelinux.org/aports/commit/?id=95ec06e8ff528eb0f8225fe2db60c11035f1a1f5
http://git.alpinelinux.org/aports/commit/?id=c2f9da6f8b698f122868ae47d065ce49d6fbc144
http://git.alpinelinux.org/aports/commit/?id=9a9304220feecc004654c58569762728e8a67104
http://git.alpinelinux.org/aports/commit/?id=1900edcab539a7ab32e3ad868597f7358fa798ad
http://git.alpinelinux.org/aports/commit/?id=22711d8124dcf1724b3b0ae900bf89567c5b979a
http://git.alpinelinux.org/aports/commit/?id=c6826747b05fd69a8385c80f7ba19d2260dd32ba
http://git.alpinelinux.org/aports/commit/?id=7f60893b079de3f360f2d63a76079f32a019f042


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###