{"id":"CVE-2016-9560","details":"Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.","modified":"2026-04-16T01:39:58.451847734Z","published":"2017-02-15T19:59:01.173Z","related":["SUSE-SU-2017:0084-1","SUSE-SU-2017:0946-1","openSUSE-SU-2024:10281-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"6.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.3"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.4"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.5"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.6"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.7"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"6.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.3"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.4"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.6"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.7"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.3"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.7"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"6.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.0"}]}]},"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3785"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94428"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1208"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/11/20/1"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/11/23/5"},{"type":"FIX","url":"https://blogs.gentoo.org/ago/2016/11/20/jasper-stack-based-buffer-overflow-in-jpc_tsfb_getbands2-jpc_tsfb-c/"},{"type":"FIX","url":"https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-9560"},{"type":"FIX","url":"https://github.com/mdadams/jasper/commit/1abc2e5a401a4bf1d5ca4df91358ce5df111f495"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jasper-software/jasper","events":[{"introduced":"0"},{"fixed":"06bccbd6b8755073e3b3c60e9c82db309b721afa"},{"fixed":"1abc2e5a401a4bf1d5ca4df91358ce5df111f495"}],"database_specific":{"source":["CPE_FIELD","REFERENCES"],"cpe":"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"1.900.30"}]}}],"versions":["mdadams-clang-issue","version-1.900.1","version-1.900.10","version-1.900.11","version-1.900.12","version-1.900.13","version-1.900.14","version-1.900.15","version-1.900.16","version-1.900.17","version-1.900.18","version-1.900.19","version-1.900.2","version-1.900.20","version-1.900.21","version-1.900.22","version-1.900.23","version-1.900.24","version-1.900.25","version-1.900.26","version-1.900.27","version-1.900.28","version-1.900.29","version-1.900.3","version-1.900.4","version-1.900.5","version-1.900.6","version-1.900.7","version-1.900.8","version-1.900.9"],"database_specific":{"vanir_signatures":[{"signature_type":"Function","source":"https://github.com/jasper-software/jasper/commit/1abc2e5a401a4bf1d5ca4df91358ce5df111f495","id":"CVE-2016-9560-2c2ab8d1","signature_version":"v1","target":{"function":"jpc_dec_tileinit","file":"src/libjasper/jpc/jpc_dec.c"},"digest":{"length":7222,"function_hash":"175780790939713017166030104739135087449"},"deprecated":false},{"signature_type":"Line","source":"https://github.com/jasper-software/jasper/commit/1abc2e5a401a4bf1d5ca4df91358ce5df111f495","id":"CVE-2016-9560-d53e43ce","signature_version":"v1","target":{"file":"src/libjasper/jpc/jpc_dec.c"},"digest":{"threshold":0.9,"line_hashes":["213472728717264795323337321314463496991","34944051443844679150364108266102405752","213113553643681384229018291800625340333","309304087652309107944001807487660727374"]},"deprecated":false}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9560.json","vanir_signatures_modified":"2026-04-11T17:13:35Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}