Skip to main content

CVE-2025-8836: Reachable Assertion in JasPer

Medium
VulnerabilityCVE-2025-8836cvecve-2025-8836
Published: Mon Aug 11 2025 (08/11/2025, 07:32:08 UTC)
Source: CVE Database V5
Product: JasPer

Description

A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.

AI-Powered Analysis

AILast updated: 08/19/2025, 01:47:24 UTC

Technical Analysis

CVE-2025-8836 is a medium-severity vulnerability affecting the JasPer library versions 4.2.0 through 4.2.5. JasPer is an open-source implementation of the JPEG-2000 codec, widely used for encoding and decoding JPEG-2000 images. The vulnerability resides in the function jpc_floorlog2 within the JPEG2000 encoder component (src/libjasper/jpc/jpc_enc.c). Specifically, the issue is a reachable assertion triggered by crafted input that leads to an assertion failure during the encoding process. This assertion failure can cause the application using JasPer to terminate unexpectedly, resulting in a denial of service (DoS). The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack complexity is low (AC:L), and no authentication is needed beyond local access. The vulnerability does not impact confidentiality, integrity, or availability beyond the local denial of service. The exploit has been publicly disclosed, but no known exploits are currently observed in the wild. A patch identified by commit 79185d32d7a444abae441935b20ae4676b3513d4 addresses the issue, and applying this patch is recommended to mitigate the vulnerability. The CVSS 4.0 base score is 4.8, reflecting a medium severity level due to the local attack vector and limited impact scope.

Potential Impact

For European organizations, the primary impact of CVE-2025-8836 is the potential for local denial of service on systems utilizing the vulnerable JasPer versions for JPEG-2000 image encoding. This could disrupt services or applications that rely on image processing, particularly in sectors such as digital media, publishing, healthcare imaging, and geospatial analysis where JPEG-2000 is more commonly used. Since exploitation requires local access, the threat is more relevant in environments where untrusted users have local system access or where multi-user systems are in place. The vulnerability does not allow remote code execution or data compromise, limiting its impact on confidentiality and integrity. However, denial of service could affect availability of critical image processing workflows, potentially delaying operations or causing system instability. Organizations with automated image processing pipelines or embedded systems using JasPer should be particularly vigilant. Given the public disclosure of the exploit, there is a risk of increased attempts to leverage this vulnerability in targeted attacks or insider threat scenarios.

Mitigation Recommendations

European organizations should prioritize patching affected JasPer versions by applying the official patch identified by commit 79185d32d7a444abae441935b20ae4676b3513d4 or upgrading to a fixed version beyond 4.2.5. Since the vulnerability requires local access, organizations should enforce strict access controls and limit local user privileges to trusted personnel only. Implementing application whitelisting and monitoring for abnormal termination of image processing applications can help detect exploitation attempts. For environments where JasPer is embedded in third-party software, coordinate with vendors to ensure timely updates. Additionally, conduct audits to identify all systems using JasPer and verify version levels. Employ host-based intrusion detection systems (HIDS) to monitor for suspicious local activity related to image encoding processes. Finally, educate system administrators and users about the risks of local exploitation and the importance of applying patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-10T11:14:50.565Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6899a019ad5a09ad0022583c

Added to database: 8/11/2025, 7:47:37 AM

Last enriched: 8/19/2025, 1:47:24 AM

Last updated: 9/22/2025, 10:03:15 AM

Views: 52

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats