Page 2 of 9 results (0.011 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ before 2.8.7 allows attackers to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors. • http://secunia.com/advisories/17522 http://secunia.com/advisories/17538 http://secunia.com/advisories/17562 http://secunia.com/advisories/17588 http://secunia.com/advisories/17591 http://secunia.com/advisories/17592 http://secunia.com/advisories/17594 http://secunia.com/advisories/17615 http://secunia.com/advisories/17657 http://secunia.com/advisories/17710 http://secunia.com/advisories/17770 http://secunia.com/advisories/17791 http://securitytracker.com/id?1015216 http:/ • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ before 2.8.7 allows attackers to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186. • http://secunia.com/advisories/17522 http://secunia.com/advisories/17538 http://secunia.com/advisories/17562 http://secunia.com/advisories/17592 http://secunia.com/advisories/17594 http://secunia.com/advisories/17615 http://secunia.com/advisories/17657 http://secunia.com/advisories/17710 http://secunia.com/advisories/17770 http://secunia.com/advisories/17791 http://securitytracker.com/id?1015216 http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf http://www.debian&# • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.5EPSS: 30%CPEs: 9EXPL: 0

Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687). Desbordamiento de enteros en pixbuf_create_from_xpm (io-xpm.c) en el decodificador de imágenes XPM de gtk+ 2.4.4 (gtk2) y anteriores, y gdk-pixbuf anteriores a 0.22 permite a atacantes remotos ejecutar código de su elección mediante ciertos valores n_col y cpp que permiten un desbordamiento de búfer basado en el montón. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 http://marc.info/?l=bugtraq&m=109528994916275&w=2 http://scary.beasts.org/security/CESA-2004-005.txt http://secunia.com/advisories/17657 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 http://www.debian.org/security/2004/dsa-546 http://www.kb.cert.org/vuls/id/729894 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 http://www.mandriva.com/security/advisories •

CVSS: 7.5EPSS: 30%CPEs: 9EXPL: 0

Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688). Vulnerabilidad basada en la pila en xpm_extract_color (io-xpm.c) en el decodificador de imagen XPM de gtk+ 2.4.4 (gtk2) y anteriores, y gdk-pixbuf anteriores a 0.22, puede permitir a atacantes remtoso ejecutar código arbitrario mediante una cierta cadena de color. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 http://marc.info/?l=bugtraq&m=109528994916275&w=2 http://scary.beasts.org/security/CESA-2004-005.txt http://secunia.com/advisories/17657 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 http://www.kb.cert.org/vuls/id/369358 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 http://www.mandrakesecure.net/en/advisories/advisory.php? • CWE-787: Out-of-bounds Write •