Get a Pentest and security assessment of your IT network.

Advisories

Mandriva Linux Security Advisory 2009-142

Mandriva Linux Security Advisory 2009-142 – Multiple security vulnerabilities has been identified and fixed in jasper. The jpc_qcx_getcompparms function in jpc/jpc_cs.c for the JasPer JPEG-2000 library (libjasper) before 1.900 allows remote user-assisted attackers to cause a denial of service (crash) and possibly corrupt the heap via malformed image files, as originally demonstrated using imagemagick convert. Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation. The jas_stream_tmpfile function in libjasper/base/jas_stream.c in JasPer 1.900.1 allows local users to overwrite arbitrary files via a symlink attack on a tmp.XXXXXXXXXX temporary file. Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf. The updated packages have been patched to prevent this. Packages for 2008.0 are being provided due to extended support for Corporate products.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/83425/MDVSA-2009-142-1.txt

Source: https://packetstormsecurity.com/files/83425/Mandriva-Linux-Security-Advisory-2009-142.html

Related posts
Advisories

Ubuntu Security Notice 93-1

Advisories

Secunia Security Advisory 18018

Advisories

Secunia Security Advisory 20784

Advisories

Secunia Security Advisory 23739