Heap buffer overflow was found in jpc_getuint16() triggered by specially crafted input file.
Created mingw-jasper tracking bugs for this issue:
Affects: fedora-all [bug 1388874]
Affects: epel-7 [bug 1388876]
Created jasper tracking bugs for this issue:
Affects: fedora-all [bug 1388873]
Affects: epel-5 [bug 1388875]
This is duplicate of CVE-2011-4517 (bug 747726). The problem was in the jpc_crg_getparms() function, which incorrectly allocated memory for cstate->numcomps. When allocating memory, function assume that each item in the array has sizeof(uint_fast16_t). However, it later handled each item as being of type jpc_crgcomp_t, a structure containing two uint_fast16_t type variables. Therefore, it allocated approximately half of the required memory, leading to heap-based buffer overflow later.
In Red Hat products, this issue was already corrected in previous updates for CVE-2011-4517.
Problem was addressed upstream in version 1.900.5 via this commit:
This CVE was rejected by Mitre:
Common Vulnerabilities and Exposures assigned an identifier CVE-2016-8881 to
the following vulnerability:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs:
CVE-2011-4517. Reason: This candidate is a duplicate of CVE-2011-4517.
Notes: All CVE users should reference CVE-2011-4517 instead of this
candidate. All references and descriptions in this candidate have been
removed to prevent accidental usage.
This flaw was found to be a duplicate of CVE-2011-4517. Please see https://access.redhat.com/security/cve/CVE-2011-4517 for information about affected products and security errata.
*** This bug has been marked as a duplicate of bug 747726 ***