Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.890920 |
Kategorie: | Debian Local Security Checks |
Titel: | Debian LTS: Security Advisory for jasper (DLA-920-1) |
Zusammenfassung: | CVE-2016-9591;Use-after-free on heap in jas_matrix_destroy;The vulnerability exists in code responsible for re-encoding the;decoded input image file to a JP2 image. The vulnerability is;caused by not setting related pointers to be null after the;pointers are freed (i.e. missing Setting-Pointer-Null operations;after free). The vulnerability can further cause double-free.;;CVE-2016-10251;Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in;JasPer before 1.900.20 allows remote attackers to have unspecified;impact via a crafted file, which triggers use of an uninitialized;value.;;Additional;fix for TEMP-CVE from last upload to avoid hassle with SIZE_MAX |
Beschreibung: | Summary: CVE-2016-9591 Use-after-free on heap in jas_matrix_destroy The vulnerability exists in code responsible for re-encoding the decoded input image file to a JP2 image. The vulnerability is caused by not setting related pointers to be null after the pointers are freed (i.e. missing Setting-Pointer-Null operations after free). The vulnerability can further cause double-free. CVE-2016-10251 Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value. Additional fix for TEMP-CVE from last upload to avoid hassle with SIZE_MAX Affected Software/OS: jasper on Debian Linux Solution: For Debian 7 'Wheezy', these problems have been fixed in version 1.900.1-13+deb7u6. We recommend that you upgrade your jasper packages. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-9591 BugTraq ID: 94952 http://www.securityfocus.com/bid/94952 Debian Security Information: DSA-3827 (Google Search) https://www.debian.org/security/2017/dsa-3827 https://security.gentoo.org/glsa/201707-07 RedHat Security Advisories: RHSA-2017:1208 https://access.redhat.com/errata/RHSA-2017:1208 |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH http://greenbone.net |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |