Bug 1034407 (CVE-2017-7885) - VUL-1: CVE-2017-7885: jbig2dec: heap-buffer-overflow by integer overflow to bypass the check in the function jbig2_decode_symbol_dict
Summary: VUL-1: CVE-2017-7885: jbig2dec: heap-buffer-overflow by integer overflow to b...
Status: RESOLVED FIXED
Alias: CVE-2017-7885
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: unspecified
Assignee: Atri Bhattacharya
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-04-17 09:44 UTC by Mikhail Kasimov
Modified: 2020-06-07 19:06 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
PoC_for_CVE-2017-7885_from_upstream_697703 (3.53 KB, application/zip)
2017-04-17 09:44 UTC, Mikhail Kasimov
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Mikhail Kasimov 2017-04-17 09:44:25 UTC
Created attachment 721432 [details]
PoC_for_CVE-2017-7885_from_upstream_697703

Ref: https://nvd.nist.gov/vuln/detail/CVE-2017-7885
=====================================
Description

Artifex jbig2dec 0.13 has a heap-based buffer over-read leading to denial of service (application crash) or disclosure of sensitive information from process memory, because of an integer overflow in the jbig2_decode_symbol_dict function in jbig2_symbol_dict.c in libjbig2dec.a during operation on a crafted .jb2 file.

Source:  MITRE      Last Modified:  04/16/2017
=====================================

Hyperlink:

https://bugs.ghostscript.com/show_bug.cgi?id=697703

(open-)SUSE:

https://software.opensuse.org/package/jbig2dec

0.13 (TW, official repo)
0.11 (42.{1,2}, official repo)
Comment 1 Marcus Meissner 2017-04-18 08:02:17 UTC
not in SLE
Comment 2 Atri Bhattacharya 2020-06-07 19:06:49 UTC
Been resolved for a while (Leap:15.1 has version 0.14, TW has v 0.18).