CVE-2016-9392
Description
The calcstepsizes function in jpc_dec.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In JasPer before 1.900.17, the calcstepsizes function in jpc_dec.c triggers an assertion failure via a crafted file, causing denial of service.
Vulnerability
JasPer before version 1.900.17 contains an assertion failure vulnerability in the calcstepsizes function within jpc_dec.c. An attacker can trigger this flaw by supplying a specially crafted JPEG-2000 image file that causes the function to assert when processing step sizes. The code path is reachable when the library or a utility such as imginfo parses the malformed file. [Description]
Exploitation
No authentication or special privileges are required. An attacker only needs to deliver a crafted JPEG-2000 image to a system using JasPer, for example via email attachment, web download, or file upload. If the file is opened by a JasPer-based application or a command-line tool, the assertion failure causes the process to crash, leading to a denial of service. No code execution is indicated in the available sources.
Impact
The impact is a denial of service caused by an assertion failure that terminates the JasPer process. Confidentiality and integrity are unaffected; availability is degraded. The scope is limited to the application using JasPer, which may be a library used by other software.
Mitigation
The vulnerability is fixed in JasPer version 1.900.17. Red Hat Enterprise Linux 7 and 6 provide updated packages to versions 1.900.1-30.el7_3 and 1.900.1-21.el6_9, respectively [1]. Ubuntu 16.04 LTS includes libjasper1 version 1.900.1-debian1-2 [2]. Users should update to the patched version supplied by their distribution or compile from the upstream source.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
14- osv-coords13 versionspkg:rpm/opensuse/jasper&distro=openSUSE%20Tumbleweedpkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3
< 2.0.33-1.2+ 12 more
- (no CPE)range: < 2.0.33-1.2
- (no CPE)range: < 1.900.14-195.3.1
- (no CPE)range: < 1.900.14-195.5.1
- (no CPE)range: < 1.900.14-134.33.3.1
- (no CPE)range: < 1.900.14-195.3.1
- (no CPE)range: < 1.900.14-195.5.1
- (no CPE)range: < 1.900.14-195.3.1
- (no CPE)range: < 1.900.14-134.33.3.1
- (no CPE)range: < 1.900.14-195.3.1
- (no CPE)range: < 1.900.14-195.5.1
- (no CPE)range: < 1.900.14-134.33.3.1
- (no CPE)range: < 1.900.14-195.3.1
- (no CPE)range: < 1.900.14-195.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.openwall.com/lists/oss-security/2016/11/17/1nvdMailing ListPatchVDB Entry
- blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failurenvdPatchThird Party AdvisoryVDB Entry
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party AdvisoryVDB Entry
- github.com/mdadams/jasper/commit/f7038068550fba0e41e1d0c355787f1dcd5bf330nvdPatchThird Party Advisory
- www.securityfocus.com/bid/94377nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2017:1208nvd
- usn.ubuntu.com/3693-1/nvd
- www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlnvd
News mentions
0No linked articles in our index yet.