Vulnerability Details : CVE-2014-8158
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2014-8158
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-8158
5.90%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-8158
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2014-8158
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-8158
-
http://www.ubuntu.com/usn/USN-2483-2
USN-2483-2: Ghostscript vulnerabilities | Ubuntu security notices
-
http://www.securityfocus.com/bid/72293
JasPer 'jpc_qmfb.c' Arbitrary Code Execution Vulnerability
-
http://secunia.com/advisories/62619
Sign in
-
http://secunia.com/advisories/62583
Sign in
-
http://www.ubuntu.com/usn/USN-2483-1
USN-2483-1: JasPer vulnerabilities | Ubuntu security notices
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:159
mandriva.com
-
http://secunia.com/advisories/62615
Sign in
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
The Slackware Linux Project: Slackware Security Advisories
-
http://rhn.redhat.com/errata/RHSA-2015-0074.html
RHSA-2015:0074 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html
openSUSE-SU-2015:0200-1: moderate: Security update for jasper
-
http://www.debian.org/security/2015/dsa-3138
Debian -- Security Information -- DSA-3138-1 jasper
-
http://advisories.mageia.org/MGASA-2015-0038.html
Mageia Advisory: MGASA-2015-0038 - Updated jasper packages fix security vulnerabilities
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:034
mandriva.com
-
http://rhn.redhat.com/errata/RHSA-2015-0698.html
RHSA-2015:0698 - Security Advisory - Red Hat Customer Portal
-
http://secunia.com/advisories/62765
Sign in
-
http://www.ocert.org/advisories/ocert-2015-001.html
oCERT archiveThird Party Advisory;US Government Resource
Jump to