Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22FCKKHQCQ3S6TZY5G44EFDTMWOJXJRD/ | vendor-advisory x_refsource_FEDORA |
| http://www.securityfocus.com/bid/93587 | vdb-entry x_refsource_BID |
| http://www.debian.org/security/2017/dsa-3785 | vendor-advisory x_refsource_DEBIAN |
| https://access.redhat.com/errata/RHSA-2017:1208 | vendor-advisory x_refsource_REDHAT |
| http://www.openwall.com/lists/oss-security/2016/08/23/6 | mailing-list x_refsource_MLIST |
| http://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html | vendor-advisory x_refsource_SUSE |
| https://github.com/mdadams/jasper/commit/44a524e367597af58d6265ae2014468b334d0309 | x_refsource_CONFIRM |
| https://blogs.gentoo.org/ago/2016/10/16/jasper-double-free-in-mem_close-jas_stream-c/ | x_refsource_MISC |
| http://www.openwall.com/lists/oss-security/2016/10/16/14 | mailing-list x_refsource_MLIST |
| https://bugzilla.redhat.com/show_bug.cgi?id=1385507 | x_refsource_CONFIRM |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|