Page 2 of 7 results (0.005 seconds)

CVSS: 4.3EPSS: 0%CPEs: 112EXPL: 0

pamperspective in Netpbm before 10.35.48 does not properly calculate a window height, which allows context-dependent attackers to cause a denial of service (crash) via a crafted image file that triggers an out-of-bounds read. pamperspective en Netpbm anterior a v10.35.48 no calcula correctamente la altura de una ventana, lo que permite a atacantes dependientes del contexto provocar una denegación de servicio (caída) mediante una archivo de imagen manipulado que dispara una lectura fuera de los límites. • http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY http://www.openwall.com/lists/oss-security/2008/10/22/7 http://www.openwall.com/lists/oss-security/2008/10/23/2 http://www.securityfocus.com/bid/31871 https://exchange.xforce.ibmcloud.com/vulnerabilities/46054 https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00058.html https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00069.html • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 10%CPEs: 4EXPL: 0

Buffer overflow in pamtofits of NetPBM 10.30 through 10.33 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code when assembling the header, possibly related to an off-by-one error. Desbordamiento de búfer en pamtofits de NetPBM v10.30 hasta 10.33, permite a atacantes remotos provocar una denegación de servicio (caída) o ejecutar código de su elección en el ensamblado de la cabecera, relacionado posiblemente con un error de superación de límite. • http://secunia.com/advisories/20729 http://secunia.com/advisories/20775 http://sourceforge.net/project/shownotes.php?release_id=425770 http://www.securityfocus.com/bid/18525 http://www.trustix.org/errata/2006/0037 http://www.vupen.com/english/advisories/2006/2449 https://exchange.xforce.ibmcloud.com/vulnerabilities/27244 •