Page 2 of 17 results (0.005 seconds)

CVSS: 5.0EPSS: 10%CPEs: 81EXPL: 0

Heap-based buffer overflow in IrfanView before 4.27 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PSD image with RLE compression. Desbordamiento de búfer basado en memoria dinámica en IrfanView en versiones anteriores a la 4.27 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente ejecutar código de su elección mediante una imagen PSD manipulada con compresión RLE. • http://irfanview.com/main_history.htm http://osvdb.org/64628 http://secunia.com/advisories/39036 http://secunia.com/secunia_research/2010-42 http://www.securityfocus.com/archive/1/511275/100/0/threaded http://www.securityfocus.com/bid/40105 https://exchange.xforce.ibmcloud.com/vulnerabilities/58549 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7397 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 10%CPEs: 81EXPL: 0

IrfanView before 4.27 does not properly handle an unspecified integer variable during processing of PSD images, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow, related to a "sign-extension error." IrfanView en versiones anteriores a la 4.27 no maneja adecuadamente una variable de entero no especificada durante el procesamiento de imagenes PSD ,lo que permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente ejecutar código de su elección mediante un fichero de imagen manipulado que dispara un desbordamiento de búfer basado en memoria dinámica, relacionado con "sign-extension error." • http://irfanview.com/main_history.htm http://osvdb.org/64627 http://secunia.com/advisories/39036 http://secunia.com/secunia_research/2010-41 http://www.securityfocus.com/archive/1/511274/100/0/threaded http://www.securityfocus.com/bid/40104 https://exchange.xforce.ibmcloud.com/vulnerabilities/58548 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6705 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 3%CPEs: 1EXPL: 0

Integer overflow in IrfanView 4.23, when the resampling or screen fitting option is enabled, allows remote attackers to execute arbitrary code via a crafted TIFF 1 BPP image, which triggers a heap-based buffer overflow. Desbordamiento de entero en IrfanView v4.23, cuando las opciones de resampleo o de ajustar a pantalla permite a atacantes remotos ejecutar código de su elección a través de una imagen TIFF 1 BPP manipulada, lo que provoca un desbordamiento de búfer basado en memoria dinámica (heap). • http://osvdb.org/55150 http://secunia.com/advisories/35359 http://www.irfanview.com/main_history.htm http://www.securityfocus.com/bid/35423 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.3EPSS: 13%CPEs: 1EXPL: 2

fpx.dll 3.9.8.0 in the FlashPix plugin for IrfanView 4.10 allows remote attackers to execute arbitrary code via a crafted FlashPix (.FPX) file, which triggers heap corruption. NOTE: some of these details are obtained from third party information. fpx.dll 3.9.8.0 en el plugin FlashPix para IrfanView 4.10 permite a atacantes remotos ejecutar código arbitrario a través de un archivo FlashPix (.FPX)manipulado, que provoca una corrupción de pila. NOTA: algunos de estos detalles se obtienen a partir de información de terceros. • https://www.exploit-db.com/exploits/4998 http://secunia.com/advisories/28688 http://www.securityfocus.com/bid/27479 http://www.vupen.com/english/advisories/2008/0318 https://exchange.xforce.ibmcloud.com/vulnerabilities/40012 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.1EPSS: 10%CPEs: 2EXPL: 0

Stack-based buffer overflow in IrfanView 3.99 and 4.00 allows user-assisted remote attackers to execute arbitrary code via a crafted palette (.pal) file. Desbordamiento de búfer basado en pila en IrfanView 3.99 y 4.00 permite a atacantes remotos con la intervención del usuario ejecutar código de su elección a través de archivos de la paleta (.pla) manipulados. • http://secunia.com/advisories/26619 http://secunia.com/secunia_research/2007-71/advisory http://www.irfanview.com/main_history.htm http://www.securityfocus.com/bid/26089 http://www.vupen.com/english/advisories/2007/3528 https://exchange.xforce.ibmcloud.com/vulnerabilities/37222 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •