An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/94925 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:1208 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9583 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/mdadams/jasper/commit/aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d | Patch Third Party Advisory |
https://github.com/mdadams/jasper/commit/f25486c3d4aa472fec79150f2c41ed4333395d3d | Patch Third Party Advisory |
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2018-08-01 17:29
Updated : 2024-02-04 20:03
NVD link : CVE-2016-9583
Mitre link : CVE-2016-9583
CVE.ORG link : CVE-2016-9583
JSON object : View
Products Affected
oracle
- outside_in_technology
jasper_project
- jasper
redhat
- enterprise_linux_server_tus
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_server
- enterprise_linux_desktop