CVE-2014-8157
Description
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An off-by-one error in JasPer's JPEG-2000 decoder can cause a heap-based buffer overflow, leading to denial of service or possible code execution.
Vulnerability
An off-by-one error exists in the jpc_dec_process_sot function of JasPer versions 1.900.1 and earlier. The flaw occurs when processing a crafted JPEG-2000 image, triggering a heap-based buffer overflow. This affects the JasPer library, which is used by various applications, including Ghostscript and the Red Hat Enterprise Virtualization Manager SPICE client [1][2][3][4].
Exploitation
An attacker can exploit this vulnerability by providing a specially crafted JPEG-2000 image file to a target application that uses the vulnerable JasPer library. No authentication is required; the attack can be delivered remotely via user interaction (e.g., opening a malicious image file) or by tricking a service into processing the file. The off-by-one error leads to writing one element beyond the allocated heap buffer [1][2].
Impact
Successful exploitation could cause a denial of service (application crash) or potentially allow arbitrary code execution with the privileges of the user running the application. For example, in the context of a browser or image viewer, code execution could lead to full compromise of the user's session [1][2][4].
Mitigation
Fixed versions are available: for Red Hat Enterprise Linux 7, jasper-1.900.1-26.el7_0.3 [1]; for Red Hat Enterprise Linux 6, jasper-1.900.1-16.el6_6.3 [1]; for Ubuntu, versions correcting CVE-2014-8157 as part of USN-2483-1 [2]; and for Ghostscript, USN-2483-2 [3]. Users should update to the latest package. There is no known workaround; the vulnerability is addressed by applying the vendor patch [1][2][3].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
5- osv-coords5 versionspkg:rpm/opensuse/jasper&distro=openSUSE%20Tumbleweedpkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 1.900.14-3.1+ 4 more
- (no CPE)range: < 1.900.14-3.1
- (no CPE)range: < 1.900.1-170.1
- (no CPE)range: < 1.900.1-170.1
- (no CPE)range: < 1.900.1-170.1
- (no CPE)range: < 1.900.1-170.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
18- www.ocert.org/advisories/ocert-2015-001.htmlnvdThird Party AdvisoryUS Government Resource
- advisories.mageia.org/MGASA-2015-0038.htmlnvd
- lists.opensuse.org/opensuse-updates/2015-02/msg00014.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-0074.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-0698.htmlnvd
- secunia.com/advisories/62583nvd
- secunia.com/advisories/62615nvd
- secunia.com/advisories/62619nvd
- secunia.com/advisories/62765nvd
- www.debian.org/security/2015/dsa-3138nvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlnvd
- www.securityfocus.com/bid/72296nvd
- www.slackware.com/security/viewer.phpnvd
- www.ubuntu.com/usn/USN-2483-1nvd
- www.ubuntu.com/usn/USN-2483-2nvd
- bugzilla.redhat.com/show_bug.cginvd
News mentions
0No linked articles in our index yet.