{"id":"DEBIAN-CVE-2011-4516","details":"Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.","modified":"2026-03-11T07:06:38.368481Z","published":"2011-12-15T03:57:34.217Z","upstream":["CVE-2011-4516"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2011-4516"}],"affected":[{"package":{"name":"ghostscript","ecosystem":"Debian:11","purl":"pkg:deb/debian/ghostscript?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.64~dfsg-2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4516.json"}},{"package":{"name":"ghostscript","ecosystem":"Debian:12","purl":"pkg:deb/debian/ghostscript?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.64~dfsg-2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4516.json"}},{"package":{"name":"ghostscript","ecosystem":"Debian:13","purl":"pkg:deb/debian/ghostscript?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.64~dfsg-2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4516.json"}},{"package":{"name":"ghostscript","ecosystem":"Debian:14","purl":"pkg:deb/debian/ghostscript?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.64~dfsg-2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4516.json"}}],"schema_version":"1.7.5"}