Skip to main content

CVE-2025-8835: NULL Pointer Dereference in JasPer

Medium
VulnerabilityCVE-2025-8835cvecve-2025-8835
Published: Mon Aug 11 2025 (08/11/2025, 07:02:07 UTC)
Source: CVE Database V5
Product: JasPer

Description

A vulnerability was found in JasPer up to 4.2.5. Affected by this vulnerability is the function jas_image_chclrspc of the file src/libjasper/base/jas_image.c of the component Image Color Space Conversion Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52. It is recommended to apply a patch to fix this issue.

AI-Powered Analysis

AILast updated: 08/11/2025, 07:32:49 UTC

Technical Analysis

CVE-2025-8835 is a vulnerability identified in the JasPer software library, specifically affecting versions 4.2.0 through 4.2.5. JasPer is an open-source implementation of the JPEG-2000 codec, widely used for image processing and compression tasks. The vulnerability resides in the function jas_image_chclrspc within the source file src/libjasper/base/jas_image.c, which handles image color space conversion. The flaw is a NULL pointer dereference that occurs when the function improperly handles certain inputs, leading to a crash or denial of service. This vulnerability can be triggered locally by an attacker with limited privileges (low privileges required) and does not require user interaction or network access, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:N). The vulnerability does not compromise confidentiality, integrity, or availability beyond causing a denial of service through application crash. Although the exploit has been publicly disclosed, there are no known active exploits in the wild at this time. A patch identified by commit bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52 has been released to address this issue. Given the medium CVSS score of 4.8, the vulnerability is considered moderate in severity, primarily due to the limited attack vector (local access required) and the impact being restricted to denial of service rather than code execution or data compromise.

Potential Impact

For European organizations, the primary impact of CVE-2025-8835 is the potential for local denial of service on systems utilizing the vulnerable JasPer versions. This could disrupt image processing workflows, particularly in environments where JasPer is integrated into larger software stacks or used in automated image handling pipelines. Industries such as media production, digital archiving, and scientific research that rely on JPEG-2000 image processing might experience operational interruptions. However, since exploitation requires local access and only causes application crashes without privilege escalation or data breach, the risk to confidentiality and integrity is minimal. Nevertheless, denial of service could lead to downtime or degraded service quality, which may affect business continuity and productivity. Organizations with strict uptime requirements or those using JasPer in critical systems should prioritize patching to avoid service disruptions. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as public exploit code is available.

Mitigation Recommendations

To mitigate CVE-2025-8835, European organizations should: 1) Identify all systems and applications using JasPer versions 4.2.0 through 4.2.5, including embedded devices and third-party software dependencies. 2) Apply the official patch corresponding to commit bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52 promptly to all affected installations. 3) Where patching is not immediately feasible, implement strict local access controls to limit user privileges and prevent untrusted users from executing or interacting with the vulnerable component. 4) Monitor system logs and application behavior for unexpected crashes or denials of service that could indicate attempted exploitation. 5) Consider deploying application whitelisting or sandboxing techniques to isolate image processing tasks and reduce the impact of potential crashes. 6) Review and update incident response plans to include scenarios involving local denial of service caused by image processing components. These steps go beyond generic advice by emphasizing inventory, access control, monitoring, and containment specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-10T11:14:46.204Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68999911ad5a09ad00221cf7

Added to database: 8/11/2025, 7:17:37 AM

Last enriched: 8/11/2025, 7:32:49 AM

Last updated: 8/11/2025, 9:13:09 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats