CVE-2016-8887

Source
https://cve.org/CVERecord?id=CVE-2016-8887
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-8887.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-8887
Downstream
Related
Published
2017-03-23T18:59:00.257Z
Modified
2026-02-18T08:08:29.005052Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The jp2colrdestroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).

References

Affected packages

Git / github.com/jasper-software/jasper

Affected ranges

Type
GIT
Repo
https://github.com/jasper-software/jasper
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

version-1.*
version-1.900.1
version-1.900.2
version-1.900.3
version-1.900.4
version-1.900.5
version-1.900.6
version-1.900.7
version-1.900.8
version-1.900.9

Database specific

vanir_signatures
[
    {
        "id": "CVE-2016-8887-9d409d97",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "50701667098450232897669611192440229775",
                "338076433796758030512808625302044573068",
                "324309987570099149972494763007595930763",
                "224182038965493698539519420357645987232"
            ],
            "threshold": 0.9
        },
        "source": "https://github.com/jasper-software/jasper/commit/e24bdc716c3327b067c551bc6cfb97fd2370358d",
        "target": {
            "file": "src/libjasper/jp2/jp2_dec.c"
        },
        "deprecated": false
    },
    {
        "id": "CVE-2016-8887-bafe3d72",
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "length": 7288.0,
            "function_hash": "319618119064158989381023722366510105818"
        },
        "source": "https://github.com/jasper-software/jasper/commit/e24bdc716c3327b067c551bc6cfb97fd2370358d",
        "target": {
            "file": "src/libjasper/jp2/jp2_dec.c",
            "function": "jp2_decode"
        },
        "deprecated": false
    },
    {
        "id": "CVE-2016-8887-cbb81028",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "221267666943798567501408066124259172212",
                "208160112183049958527465613144070537871",
                "116037558554707769102437633966911769677",
                "262463792489045736920271914399257841767",
                "69777698812558398975421155251324740271",
                "129362356682636422634674043527455250059",
                "28176063121865665378654204168561871458",
                "332418229748532078438734901431071398185"
            ],
            "threshold": 0.9
        },
        "source": "https://github.com/jasper-software/jasper/commit/e24bdc716c3327b067c551bc6cfb97fd2370358d",
        "target": {
            "file": "src/libjasper/jp2/jp2_cod.c"
        },
        "deprecated": false
    },
    {
        "id": "CVE-2016-8887-ef9beab2",
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "length": 1388.0,
            "function_hash": "14110781456049632284308564067589629719"
        },
        "source": "https://github.com/jasper-software/jasper/commit/e24bdc716c3327b067c551bc6cfb97fd2370358d",
        "target": {
            "file": "src/libjasper/jp2/jp2_cod.c",
            "function": "jp2_box_get"
        },
        "deprecated": false
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-8887.json"