oCERT-2014-012 JasPer input sanitization errors

Description:

The JasPer project is an open source implementation for the JPEG-2000 codec.

The library is affected by a double-free vulnerability in function jas_iccattrval_destroy() as well as a heap-based buffer overflow in function jp2_decode().

A specially crafted jp2 file can be used to trigger the vulnerabilities.

Affected version:

JasPer <= 1.900.1

Fixed version:

JasPer, N/A

Credit: vulnerability report received from the Google Security Team.

CVE: CVE-2014-8137 (double-free), CVE-2014-8138 (heap overflow)

Timeline:

2014-12-10: vulnerability report received
2014-12-10: contacted affected vendors
2014-12-10: assigned CVEs
2014-12-18: patch contributed by Tomas Hoger from Red Hat Product Security
2014-12-18: advisory release

References:
http://www.ece.uvic.ca/~frodo/jasper
https://bugzilla.redhat.com/show_bug.cgi?id=1173157
https://bugzilla.redhat.com/show_bug.cgi?id=1173162