6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
55.8%
Bingchang Liu discovered that jbig2dec incorrectly handled memory when
decoding malformed image files. If a user or automated system were tricked
into processing a specially crafted JBIG2 image file, a remote attacker
could cause jbig2dec to crash, resulting in a denial of service, or
possibly execute arbitrary code. This issue only applied to Ubuntu 14.04
LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-9601)
It was discovered that jbig2dec incorrectly handled memory when decoding
malformed image files. If a user or automated system were tricked into
processing a specially crafted JBIG2 image file, a remote attacker could
cause jbig2dec to crash, resulting in a denial of service, or possibly
disclose sensitive information. (CVE-2017-7885)
Jiaqi Peng discovered that jbig2dec incorrectly handled memory when
decoding malformed image files. If a user or automated system were tricked
into processing a specially crafted JBIG2 image file, a remote attacker
could cause jbig2dec to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2017-7975)
Dai Ge discovered that jbig2dec incorrectly handled memory when decoding
malformed image files. If a user or automated system were tricked into
processing a specially crafted JBIG2 image file, a remote attacker could
cause jbig2dec to crash, resulting in a denial of service, or possibly
disclose sensitive information. (CVE-2017-7976)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 17.04 | noarch | jbig2dec | < 0.13-4ubuntu0.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | jbig2dec-dbgsym | < 0.13-4ubuntu0.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libjbig2dec0 | < 0.13-4ubuntu0.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libjbig2dec0-dbgsym | < 0.13-4ubuntu0.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libjbig2dec0-dev | < 0.13-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | jbig2dec | < 0.13-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | jbig2dec-dbgsym | < 0.13-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libjbig2dec0 | < 0.13-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libjbig2dec0-dbgsym | < 0.13-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libjbig2dec0-dev | < 0.13-2ubuntu0.1 | UNKNOWN |
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
55.8%