CVE-2013-3941
https://notcve.org/view.php?id=CVE-2013-3941
Xjp2.dll in XnView before 2.13 allows remote attackers to execute arbitrary code via (1) the Csiz parameter in a SIZ marker, which triggers an incorrect memory allocation, or (2) the lqcd field in a QCD marker in a crafted JPEG2000 file, which leads to a heap-based buffer overflow. En la biblioteca Xjp2.dll en XnView versiones anteriores a la versión 2.13, permite a atacantes remotos ejecutar código arbitrario por medio de (1) el parámetro Csiz en un marcador SIZ, que desencadena una asignación de memoria incorrecta, o (2) el campo lqcd en un marcador QCD en un archivo JPEG2000 diseñado, lo que conlleva a un desbordamiento de búfer en la región heap de la memoria. • http://newsgroup.xnview.com/viewtopic.php?f=35&t=29087 http://secunia.com/advisories/52101 • CWE-787: Out-of-bounds Write •
CVE-2013-2577 – XnView 2.03 - '.pct' Buffer Overflow
https://notcve.org/view.php?id=CVE-2013-2577
Buffer overflow in XnView before 2.04 allows remote attackers to execute arbitrary code via a crafted PCT file. Desbordamiento de búfer en XnView anterior a v2.04 permite a atacantes remotos ejecutar código arbitrario a través de un archivo PCT manipulado. • https://www.exploit-db.com/exploits/27049 http://archives.neohapsis.com/archives/bugtraq/2013-07/0153.html http://newsgroup.xnview.com/viewtopic.php?f=35&t=28400 http://osvdb.org/95580 http://secunia.com/advisories/54174 http://www.coresecurity.com/advisories/xnview-buffer-overflow-vulnerability http://www.exploit-db.com/exploits/27049 http://www.securitytracker.com/id/1028817 https://exchange.xforce.ibmcloud.com/vulnerabilities/85919 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-4988 – XnView 1.99.1 - '.JLS' File Decompression Heap Overflow
https://notcve.org/view.php?id=CVE-2012-4988
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file. Desbordamiento de buffer basado en memoria dinámica en el plugin de formato xjpegls.dll (también conocido como JLS, JPEG-LS o JPEG lossless) en XnView 1.99 y 1.99.1 permite a atacantes remotos ejecutar código arbitrario a través de un fichero de imagen JLS manipulado. • https://www.exploit-db.com/exploits/21741 http://osvdb.org/show/osvdb/85893 http://seclists.org/fulldisclosure/2012/Oct/36 http://secunia.com/advisories/50825 http://www.reactionpenetrationtesting.co.uk/xnview-jls-heap.html http://www.securityfocus.com/bid/55787 https://exchange.xforce.ibmcloud.com/vulnerabilities/79030 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •