Mandriva Linux Security Advisory 2009-317 – Multiple security vulnerabilities has been identified and fixed Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation. Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf. pamperspective in Netpbm before 10.35.48 does not properly calculate a window height, which allows context-dependent attackers to cause a denial of service (crash) via a crafted image file that triggers an out-of-bounds read. Packages for 2008.0 are being provided due to extended support for Corporate products. This update fixes this vulnerability.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/83507/MDVSA-2009-317.txt
Source: https://packetstormsecurity.com/files/83507/Mandriva-Linux-Security-Advisory-2009-317.html

