Page 108 of 1121 results (0.022 seconds)

CVSS: 5.7EPSS: 0%CPEs: 4EXPL: 0

Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file. Fuga de memoria en la función jas_iccprof_createfrombuf en JasPer 1.900.1 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de un perfil de color ICC en un archivo de imagen JPEG2000. • http://www.debian.org/security/2016/dsa-3508 http://www.openwall.com/lists/oss-security/2016/03/03/12 http://www.securityfocus.com/bid/84133 http://www.ubuntu.com/usn/USN-2919-1 https://access.redhat.com/errata/RHSA-2017:1208 https://bugs.launchpad.net/ubuntu/+source/jasper/+bug/1547865 https://access.redhat.com/security/cve/CVE-2016-2116 https://bugzilla.redhat.com/show_bug.cgi?id=1314472 • CWE-399: Resource Management Errors CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.6EPSS: 3%CPEs: 4EXPL: 0

Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137. Vulnerabilidad de liberación doble en la función jas_iccattrval_destroy en JasPer 1.900.1 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (caída) o posiblemente ejecutar código arbitrario a través de un perfil de color ICC en un archivo de imagen JPEG 2000, una vulnerabilidad diferente a CVE-2014-8137. • http://www.debian.org/security/2016/dsa-3508 http://www.openwall.com/lists/oss-security/2016/03/03/12 http://www.securityfocus.com/bid/84133 http://www.ubuntu.com/usn/USN-2919-1 https://access.redhat.com/errata/RHSA-2017:1208 https://bugs.launchpad.net/ubuntu/+source/jasper/+bug/1547865 https://access.redhat.com/security/cve/CVE-2016-1577 https://bugzilla.redhat.com/show_bug.cgi?id=1314466 • CWE-416: Use After Free •

CVSS: 9.8EPSS: 7%CPEs: 3EXPL: 0

Integer overflow in the create_bits function in pixman-bits-image.c in Pixman before 0.32.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via large height and stride values. Desbordamiento de entero en la función create_bits en pixman-bits-image.c en Pixman en versiones anteriores a 0.32.6 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código arbitrario a través de valores grandes de height y stride. • http://www.debian.org/security/2016/dsa-3525 http://www.openwall.com/lists/oss-security/2016/02/24/13 http://www.openwall.com/lists/oss-security/2016/02/24/15 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.ubuntu.com/usn/USN-2918-1 https://bugs.freedesktop.org/show_bug.cgi?id=69014 https://bugzilla.redhat.com/show_bug.cgi?id=972647 https://cgit.freedesktop.org/pixman/commit/?id=857e40f3d2bc2cfb714913e0cd7e6184cf69aca3 https://lists&# • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 0%CPEs: 19EXPL: 0

Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp. Perl podría permitir a atacantes dependientes de contexto eludir los mecanismos de protección taint en un proceso hijo a través de variables de entorno duplicadas en envp. • http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076 http://www.debian.org/security/2016/dsa-3501 http://www.gossamer-threads.com/lists/perl/porters/326387 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/b • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 6%CPEs: 40EXPL: 0

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c. Múltiples desbordamientos de entero en OpenSSL 1.0.1 en versiones anteriores a 1.0.1s y 1.0.2 en versiones anteriores a 1.0.2g permiten a atacantes remotos causar una denegación de servicio (corrupción de memoria dinámica o referencia a puntero NULL) o posiblemente tener otro impacto no especificado a través de una cadena de dígitos de gran tamaño que no es manejada correctamente por la función (1) BN_dec2bn o (2) BN_hex2bn, relacionada con crypto/bn/bn.h y crypto/bn/bn_print.c. An integer overflow flaw, leading to a NULL pointer dereference or a heap-based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.h •