#VU15698 Reachable Assertion in JasPer


Published: 2018-11-02

Vulnerability identifier: #VU15698

Vulnerability risk: Low

CVSSv3.1: 3.6 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C]

CVE-ID: CVE-2016-9396

CWE-ID: CWE-617

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
JasPer
Client/Desktop applications / Multimedia software

Vendor: The JasPer Project

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attacks.

The vulnerability exists due to reachable assertion in JPC_NOMINALGAIN function in jpc/jpc_t1cod.c in JasPer through 2.0.12. A remote attacker can perform a denial of service (DoS) attack via unspecified vectors.

Mitigation
Install update from vendor's website.

Vulnerable software versions

JasPer: 1.701.0 - 2.0.12


External links
http://www.openwall.com/lists/oss-security/2016/11/17/1
http://access.redhat.com/errata/RHSA-2018:3253
http://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure
http://bugzilla.redhat.com/show_bug.cgi?id=1396978
http://bugzilla.redhat.com/show_bug.cgi?id=1485272
http://usn.ubuntu.com/3693-1/
http://github.com/mdadams/jasper/issues/50


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability