
CVE-2019-7578 – SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c
https://notcve.org/view.php?id=CVE-2019-7578
07 Feb 2019 — SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c. SDL (Simple DirectMedia Layer), hasta la versión 1.2.15 y en versiones 2.x hasta la 2.0.9, tiene una sobrelectura de búfer basada en memoria dinámica (heap) en InitIMA_ADPCM en audio/SDL_wave.c. Simple DirectMedia Layer is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. Issues addressed include buffer ov... • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html • CWE-122: Heap-based Buffer Overflow CWE-125: Out-of-bounds Read •

CVE-2018-20760
https://notcve.org/view.php?id=CVE-2018-20760
06 Feb 2019 — In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because a certain -1 return value is mishandled. GPAC versión 0.7.1 y anteriores, gf_text_get_utf8_line en media_tools/text_import.c en libgpac_static.a permite una escritura fuera de límites porque un determinado valor de retorno -1 se manjea de forma inadecuada. • https://github.com/gpac/gpac/commit/4c1360818fc8948e9307059fba4dc47ba8ad255d • CWE-787: Out-of-bounds Write •

CVE-2018-20761 – Ubuntu Security Notice USN-3926-1
https://notcve.org/view.php?id=CVE-2018-20761
06 Feb 2019 — GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a. GPAC versión 0.7.1 y anteriores tiene una vulnerabilidad de desbordamiento de búfer en la función gf_sm_load_init en scene_manager.c en libgpac_static.a. It was discovered that the GPAC MP4Box utility incorrectly handled certain memory operations. If an user or automated system were tricked into opening a specially crafted MP4 file, a remote attacker could use this issue... • https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2018-20762
https://notcve.org/view.php?id=CVE-2018-20762
06 Feb 2019 — GPAC version 0.7.1 and earlier has a buffer overflow vulnerability in the cat_multiple_files function in applications/mp4box/fileimport.c when MP4Box is used for a local directory containing crafted filenames. GPAC versión 0.7.1 y anteriores tiene una vulnerabilidad de desbordamiento de búfer en la función cat_multiple_files en aplicaciones/mp4box/fileimport.c cuando MP4Box se utiliza para un directorio local que contiene nombres de archivo creados. • https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2018-20763
https://notcve.org/view.php?id=CVE-2018-20763
06 Feb 2019 — In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because of missing szLineConv bounds checking. GPAC versión 0.7.1 y anteriores, gf_text_get_utf8_line en media_tools/text_import.c en libgpac_static.a permite una escritura fuera de límites debido a la falta de comprobación de límites szLineConv. • https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd • CWE-787: Out-of-bounds Write •

CVE-2019-7548 – python-sqlalchemy: SQL Injection when the group_by parameter can be controlled
https://notcve.org/view.php?id=CVE-2019-7548
06 Feb 2019 — SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled. SQLAlchemy 1.2.17 tiene una inyección SQL cuando el parámetro group_by se puede controlar. Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. SQLAlchemy is an Object Relational Mapper that provides a... • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2018-16890 – curl: NTLM type-2 heap out-of-bounds buffer read
https://notcve.org/view.php?id=CVE-2018-16890
06 Feb 2019 — libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds. Libcurl, desde la versión 7.36.0 hasta antes de la 7.64... • https://github.com/michelleamesquita/CVE-2018-16890 • CWE-125: Out-of-bounds Read CWE-190: Integer Overflow or Wraparound •

CVE-2019-3822 – curl: NTLMv2 type-3 header stack buffer overflow
https://notcve.org/view.php?id=CVE-2019-3822
06 Feb 2019 — libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the loca... • http://www.securityfocus.com/bid/106950 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2018-8794 – Debian Security Advisory 4394-1
https://notcve.org/view.php?id=CVE-2018-8794
05 Feb 2019 — rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution. Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen un desbordamiento de enteros que provoca una escritura fuera de límites en la función process_bitmap_updates() y podría resultar en una corrupción de memoria o incluso una ejecución remota de código. Multiple vulnerabili... • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2018-8795 – Debian Security Advisory 4394-1
https://notcve.org/view.php?id=CVE-2018-8795
05 Feb 2019 — rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution. Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen un desbordamiento de enteros que provoca un desbordamiento de búfer basado en memoria dinámica (heap) en la función process_bitmap_updates() y podría resultar en una corrupción de memoria o incluso una ejecución re... • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow CWE-787: Out-of-bounds Write •