openSUSE Security Update : jasper (openSUSE-2017-844)

Medium Nessus Plugin ID 101972

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for jasper fixes the following issues :

Security issues fixed :

- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)

- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
(bsc#1010975)

- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a denial of service (assertion failure). (bsc#1010968)

- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
(bsc#1010774)

- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a denial of service (assertion failure) via a very large integer.
(bsc#1010782)

- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial of service.
(bsc#1047958)

CVEs already fixed with previous update :

- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial of service (assertion failure) via a crafted file. (bsc#1010757)

- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
(bsc#1010766)

- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
(bsc#1010756)

This update was imported from the SUSE:SLE-12:Update update project.

Solution

Update the affected jasper packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1009994

https://bugzilla.opensuse.org/show_bug.cgi?id=1010756

https://bugzilla.opensuse.org/show_bug.cgi?id=1010757

https://bugzilla.opensuse.org/show_bug.cgi?id=1010766

https://bugzilla.opensuse.org/show_bug.cgi?id=1010774

https://bugzilla.opensuse.org/show_bug.cgi?id=1010782

https://bugzilla.opensuse.org/show_bug.cgi?id=1010968

https://bugzilla.opensuse.org/show_bug.cgi?id=1010975

https://bugzilla.opensuse.org/show_bug.cgi?id=1047958

Plugin Details

Severity: Medium

ID: 101972

File Name: openSUSE-2017-844.nasl

Version: Revision: 3.2

Type: local

Agent: unix

Published: 2017/07/26

Updated: 2018/01/26

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:jasper, p-cpe:/a:novell:opensuse:jasper-debuginfo, p-cpe:/a:novell:opensuse:jasper-debugsource, p-cpe:/a:novell:opensuse:libjasper-devel, p-cpe:/a:novell:opensuse:libjasper1, p-cpe:/a:novell:opensuse:libjasper1-32bit, p-cpe:/a:novell:opensuse:libjasper1-debuginfo, p-cpe:/a:novell:opensuse:libjasper1-debuginfo-32bit, cpe:/o:novell:opensuse:42.2, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2017/07/25

Reference Information

CVE: CVE-2016-9262, CVE-2016-9388, CVE-2016-9389, CVE-2016-9390, CVE-2016-9391, CVE-2016-9392, CVE-2016-9393, CVE-2016-9394, CVE-2017-1000050