Gentoo Logo

JasPer: User-assisted execution of arbitrary code


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201201-10 / JasPer
Release Date January 23, 2012
Latest Revision January 23, 2012: 1
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
media-libs/jasper < 1.900.1-r4 >= 1.900.1-r4 All supported architectures

Related bugreports: #394879


Multiple memory management errors in JasPer could result in execution of arbitrary code or a Denial of Service.

2.  Impact Information


The JasPer Project is an open-source initiative to provide a free software-based reference implementation of the codec specified in the JPEG-2000 Part-1 (jpeg2k) standard.


Two vulnerabilities have been found in JasPer:

  • The jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c contains an error that could overwrite certain callback pointers, possibly causing a heap-based buffer overflow (CVE-2011-4516).
  • The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c uses an incorrect data type, possibly causing a heap-based buffer overflow (CVE-2011-4517).


A remote attacker could entice a user or automated system to process specially crafted JPEG-2000 files with an application using JasPer, possibly resulting in the execution of arbitrary code with the privileges of the application, or a Denial of Service.

3.  Resolution Information


There is no known workaround at this time.


All JasPer users should upgrade to the latest version:

Code Listing 3.1: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=media-libs/jasper-1.900.1-r4"

4.  References


Page updated January 23, 2012

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.