Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2014-9029 First vendor Publication 2014-12-08
Vendor Cve Last vendor Modification 2018-10-09

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-189 Numeric Errors (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:27677
 
Oval ID: oval:org.mitre.oval:def:27677
Title: DSA-3089-1 -- jasper security update
Description: Josh Duart of the Google Security Team discovered heap-based buffer overflow flaws in JasPer, a library for manipulating JPEG-2000 files, which could lead to denial of service (application crash) or the execution of arbitrary code.
Family: unix Class: patch
Reference(s): DSA-3089-1
CVE-2014-9029
Version: 3
Platform(s): Debian GNU/Linux 7.0
Debian GNU/kFreeBSD 7.0
Product(s): jasper
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28420
 
Oval ID: oval:org.mitre.oval:def:28420
Title: ELSA-2014-2021 -- jasper security update (important)
Description: [1.900.1-16.2] - CVE-2014-8137 - double-free in in jas_iccattrval_destroy (#1173566) - CVE-2014-8138 - heap overflow in jp2_decode (#1173566) [1.900.1-16.1] - CVE-2014-9029 - incorrect component number check in COC, RGN and QCC marker segment decoders (#1171208) [1.900.1-16] - CERT VU#887409: heap buffer overflow flaws lead to arbitrary code execution (#749150)
Family: unix Class: patch
Reference(s): ELSA-2014-2021
CVE-2014-8137
CVE-2014-8138
CVE-2014-9029
Version: 3
Platform(s): Oracle Linux 6
Oracle Linux 7
Product(s): jasper
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28505
 
Oval ID: oval:org.mitre.oval:def:28505
Title: USN-2434-1 -- JasPer vulnerability
Description: Jose Duart discovered that JasPer incorrectly handled certain malformed JPEG-2000 image files. If a user were tricked into opening a specially crafted JPEG-2000 image file, a remote attacker could cause JasPer to crash or possibly execute arbitrary code with user privileges.
Family: unix Class: patch
Reference(s): USN-2434-1
CVE-2014-9029
Version: 3
Platform(s): Ubuntu 14.10
Ubuntu 14.04
Ubuntu 12.04
Product(s): jasper
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28532
 
Oval ID: oval:org.mitre.oval:def:28532
Title: RHSA-2014:2021 -- jasper security update (Important)
Description: JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Multiple off-by-one flaws, leading to heap-based buffer overflows, were found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2014-9029) A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2014-8138) A double free flaw was found in the way JasPer parsed ICC color profiles in JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2014-8137) Red Hat would like to thank oCERT for reporting these issues. oCERT acknowledges Jose Duart of the Google Security Team as the original reporter. All JasPer users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All applications using the JasPer libraries must be restarted for the update to take effect.
Family: unix Class: patch
Reference(s): RHSA-2014:2021
CESA-2014:2021-CentOS 6
CESA-2014:2021-CentOS 7
CVE-2014-8137
CVE-2014-8138
CVE-2014-9029
Version: 3
Platform(s): Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
CentOS Linux 6
CentOS Linux 7
Product(s): jasper
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28534
 
Oval ID: oval:org.mitre.oval:def:28534
Title: USN-2434-2 -- Ghostscript vulnerability
Description: USN-2434-1 fixed a vulnerability in JasPer. This update provides the corresponding fix for the JasPer library embedded in the Ghostscript package. Original advisory details: Jose Duart discovered that JasPer incorrectly handled certain malformed JPEG-2000 image files. If a user were tricked into opening a specially crafted JPEG-2000 image file, a remote attacker could cause JasPer to crash or possibly execute arbitrary code with user privileges.
Family: unix Class: patch
Reference(s): USN-2434-2
CVE-2014-9029
Version: 3
Platform(s): Ubuntu 10.04
Product(s): ghostscript
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3

Nessus® Vulnerability Scanner

Date Description
2017-05-11 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2017-0102.nasl - Type : ACT_GATHER_INFO
2016-11-07 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-1270.nasl - Type : ACT_GATHER_INFO
2016-02-22 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_006e3b7cd7d711e5b85f0018fe623f2b.nasl - Type : ACT_GATHER_INFO
2015-10-30 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2015-302-02.nasl - Type : ACT_GATHER_INFO
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-159.nasl - Type : ACT_GATHER_INFO
2015-03-26 Name : The remote Debian host is missing a security update.
File : debian_DLA-101.nasl - Type : ACT_GATHER_INFO
2015-03-20 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-0698.nasl - Type : ACT_GATHER_INFO
2015-03-09 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201503-01.nasl - Type : ACT_GATHER_INFO
2015-02-04 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_libjasper-141204.nasl - Type : ACT_GATHER_INFO
2015-01-27 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2015-0006.nasl - Type : ACT_GATHER_INFO
2015-01-09 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2015-466.nasl - Type : ACT_GATHER_INFO
2015-01-06 Name : The remote Fedora host is missing a security update.
File : fedora_2014-16349.nasl - Type : ACT_GATHER_INFO
2015-01-06 Name : The remote Fedora host is missing a security update.
File : fedora_2014-16465.nasl - Type : ACT_GATHER_INFO
2015-01-06 Name : The remote Fedora host is missing a security update.
File : fedora_2014-16292.nasl - Type : ACT_GATHER_INFO
2014-12-19 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20141218_jasper_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2014-12-19 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-2021.nasl - Type : ACT_GATHER_INFO
2014-12-19 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-2021.nasl - Type : ACT_GATHER_INFO
2014-12-19 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-2021.nasl - Type : ACT_GATHER_INFO
2014-12-17 Name : The remote Fedora host is missing a security update.
File : fedora_2014-17032.nasl - Type : ACT_GATHER_INFO
2014-12-17 Name : The remote Fedora host is missing a security update.
File : fedora_2014-17027.nasl - Type : ACT_GATHER_INFO
2014-12-17 Name : The remote Fedora host is missing a security update.
File : fedora_2014-16961.nasl - Type : ACT_GATHER_INFO
2014-12-16 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-781.nasl - Type : ACT_GATHER_INFO
2014-12-15 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-247.nasl - Type : ACT_GATHER_INFO
2014-12-09 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2434-2.nasl - Type : ACT_GATHER_INFO
2014-12-09 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2434-1.nasl - Type : ACT_GATHER_INFO
2014-12-05 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3089.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/71476
BUGTRAQ http://www.securityfocus.com/archive/1/534153/100/0/threaded
CONFIRM http://advisories.mageia.org/MGASA-2014-0514.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
https://bugzilla.redhat.com/show_bug.cgi?id=1167537
DEBIAN http://www.debian.org/security/2014/dsa-3089
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2014:247
http://www.mandriva.com/security/advisories?name=MDVSA-2015:159
MISC http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html
http://www.ocert.org/advisories/ocert-2014-009.html
MLIST http://www.openwall.com/lists/oss-security/2014/12/04/9
REDHAT http://rhn.redhat.com/errata/RHSA-2014-2021.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
SECUNIA http://secunia.com/advisories/61747
http://secunia.com/advisories/62828
SLACKWARE http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&...
UBUNTU http://www.ubuntu.com/usn/USN-2434-1
http://www.ubuntu.com/usn/USN-2434-2
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/99125

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Date Informations
2021-05-05 01:16:20
  • Multiple Updates
2021-05-04 12:35:08
  • Multiple Updates
2021-04-22 01:42:41
  • Multiple Updates
2020-05-23 01:53:47
  • Multiple Updates
2020-05-23 00:42:52
  • Multiple Updates
2018-10-10 00:19:53
  • Multiple Updates
2018-07-19 09:19:07
  • Multiple Updates
2017-09-08 09:23:14
  • Multiple Updates
2017-05-13 13:24:41
  • Multiple Updates
2017-01-03 09:23:01
  • Multiple Updates
2016-12-07 09:24:13
  • Multiple Updates
2016-11-08 13:26:35
  • Multiple Updates
2016-07-21 12:05:39
  • Multiple Updates
2016-02-23 13:26:54
  • Multiple Updates
2015-10-31 13:23:56
  • Multiple Updates
2015-04-03 09:26:58
  • Multiple Updates
2015-03-31 13:29:02
  • Multiple Updates
2015-03-27 13:28:48
  • Multiple Updates
2015-03-26 09:26:50
  • Multiple Updates
2015-03-24 09:28:37
  • Multiple Updates
2015-03-21 13:27:36
  • Multiple Updates
2015-03-10 13:25:06
  • Multiple Updates
2015-02-05 13:23:47
  • Multiple Updates
2015-01-28 13:24:07
  • Multiple Updates
2015-01-12 13:23:55
  • Multiple Updates
2015-01-10 13:23:23
  • Multiple Updates
2015-01-07 13:26:29
  • Multiple Updates
2015-01-01 09:24:34
  • Multiple Updates
2014-12-20 13:24:22
  • Multiple Updates
2014-12-18 13:25:36
  • Multiple Updates
2014-12-17 21:24:53
  • Multiple Updates
2014-12-17 13:25:32
  • Multiple Updates
2014-12-16 21:24:55
  • Multiple Updates
2014-12-16 13:25:38
  • Multiple Updates
2014-12-12 09:24:57
  • Multiple Updates
2014-12-10 13:27:00
  • Multiple Updates
2014-12-10 09:25:41
  • Multiple Updates
2014-12-09 17:25:07
  • Multiple Updates
2014-12-08 21:27:23
  • First insertion