{"id":"CVE-2016-9388","details":"The ras_getcmap function in ras_dec.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.","modified":"2026-05-13T12:00:37.905205991Z","published":"2017-03-23T18:59:00.617Z","related":["SUSE-SU-2017:1901-1","SUSE-SU-2017:1916-1","SUSE-SU-2018:0339-1","openSUSE-SU-2024:10869-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","extracted_events":[{"last_affected":"14.04"}],"source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"16.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94371"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1208"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3693-1/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1396962"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/11/17/1"},{"type":"FIX","url":"https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure"},{"type":"FIX","url":"https://github.com/mdadams/jasper/commit/411a4068f8c464e883358bf403a3e25158863823"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jasper-software/jasper","events":[{"introduced":"0"},{"fixed":"393c8ea3226351a90f7235f751531b9987e2c9bd"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"1.900.14"}],"cpe":"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["version-1.900.13","version-1.900.12","version-1.900.11","version-1.900.10","version-1.900.9","version-1.900.8","version-1.900.7","version-1.900.6","version-1.900.5","version-1.900.4","version-1.900.3","version-1.900.2","version-1.900.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9388.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}