Vulnerability identifier: #VU38407
Vulnerability risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2017-13745
CWE-ID:
CWE-617
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
JasPer
Client/Desktop applications /
Multimedia software
Vendor: The JasPer Project
Description
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is a reachable assertion abort in the function jpc_dec_process_sot() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack by triggering an unexpected jpc_ppmstabtostreams return value, a different vulnerability than CVE-2018-9154.
Mitigation
Install update from vendor's website.
Vulnerable software versions
JasPer: 2.0.12
External links
https://www.securityfocus.com/bid/100514
https://bugzilla.redhat.com/show_bug.cgi?id=1485274
https://security.gentoo.org/glsa/201908-03
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.