Heap buffer overflow was found in jpc_getuint16() triggered by specially crafted input file. Upstream bug: https://github.com/mdadams/jasper/issues/29 CVE assignment: http://seclists.org/oss-sec/2016/q4/216
Created mingw-jasper tracking bugs for this issue: Affects: fedora-all [bug 1388874] Affects: epel-7 [bug 1388876]
Created jasper tracking bugs for this issue: Affects: fedora-all [bug 1388873] Affects: epel-5 [bug 1388875]
This is duplicate of CVE-2011-4517 (bug 747726). The problem was in the jpc_crg_getparms() function, which incorrectly allocated memory for cstate->numcomps. When allocating memory, function assume that each item in the array has sizeof(uint_fast16_t). However, it later handled each item as being of type jpc_crgcomp_t, a structure containing two uint_fast16_t type variables. Therefore, it allocated approximately half of the required memory, leading to heap-based buffer overflow later. In Red Hat products, this issue was already corrected in previous updates for CVE-2011-4517. Problem was addressed upstream in version 1.900.5 via this commit: https://github.com/mdadams/jasper/commit/0d22460816ea58e74a124158fa6cc48efb709a47
This CVE was rejected by Mitre: Common Vulnerabilities and Exposures assigned an identifier CVE-2016-8881 to the following vulnerability: Name: CVE-2016-8881 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8881 Assigned: 20161022 ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4517. Reason: This candidate is a duplicate of CVE-2011-4517. Notes: All CVE users should reference CVE-2011-4517 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Statement: This flaw was found to be a duplicate of CVE-2011-4517. Please see https://access.redhat.com/security/cve/CVE-2011-4517 for information about affected products and security errata.
*** This bug has been marked as a duplicate of bug 747726 ***