CVE-2008-3520
Published: 2 October 2008
Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation.
Notes
Author | Note |
---|---|
mdeslaur | RH released netpbm with this CVE, as it shared code with jasper our netpbm-free doesn't appear to. |
Priority
Status
Package | Release | Status |
---|---|---|
ghostscript Launchpad, Ubuntu, Debian |
hardy |
Released
(8.61.dfsg.1-1ubuntu3.4)
|
lucid |
Released
(8.71.dfsg.1-0ubuntu5.4)
|
|
maverick |
Released
(8.71.dfsg.2-0ubuntu7.1)
|
|
natty |
Not vulnerable
(uses system jasper)
|
|
oneiric |
Not vulnerable
(uses system jasper)
|
|
upstream |
Needs triage
|
|
jasper Launchpad, Ubuntu, Debian |
dapper |
Released
(1.701.0-2ubuntu0.6.06.1)
|
feisty |
Ignored
(end of life, was needed)
|
|
gutsy |
Released
(1.900.1-3ubuntu0.7.10.1)
|
|
hardy |
Released
(1.900.1-3ubuntu0.8.04.1)
|
|
intrepid |
Released
(1.900.1-5ubuntu0.1)
|
|
lucid |
Not vulnerable
|
|
maverick |
Not vulnerable
|
|
natty |
Not vulnerable
|
|
oneiric |
Not vulnerable
|
|
upstream |
Released
(1.900.1-5.1)
|
|
Patches: vendor: https://bugzilla.redhat.com/attachment.cgi?id=325790 vendor: http://patch-tracking.debian.net/patch/series/view/jasper/1.900.1-5.1/02_security.dpatch |