Page 2 of 7 results (0.010 seconds)

CVSS: 7.5EPSS: 9%CPEs: 2EXPL: 0

Multiple buffer overflows in abcm2ps before 5.9.12 might allow remote attackers to execute arbitrary code via (1) a crafted input file, related to the PUT0 and PUT1 output macros; (2) a crafted input file, related to the trim_title function; and possibly (3) a long -O option on a command line. Múltiples desbordamientos de búfer en abcm2ps antes de v5.9.12 podrían permitir a atacantes remotos ejecutar código arbitrario a través de (1) un archivo de entrada debidamente modificado en relación con las macros de salida PUT0 y PUT1, (2) un archivo de entrada debidamente modificado, en relación con la función trim_title, y posiblemente (3) una opción -O demasiado larga en linea de comandos. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577014 http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054015.html http://moinejf.free.fr/abcm2ps-5.txt http://secunia.com/advisories/39345 http://secunia.com/advisories/43338 http://www.openwall.com/lists/oss-security/2010/04/08/5 http://www.openwall.com/lists/oss-security/2010/04/08/6 http://www.openwall.com/lists/oss-security/2010/04/08/7 http://www.securityfocus.com/bid/39271 http:/ • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 10.0EPSS: 3%CPEs: 1EXPL: 1

Buffer overflow in the put_words function in subs.c for abcm2ps 3.7.20 allows remote attackers to execute arbitrary code via crafted ABC files. • http://tigger.uic.edu/~jlongs2/holes/abcm2ps.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/18579 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •