Page 3 of 15 results (0.003 seconds)

CVSS: 5.0EPSS: 10%CPEs: 5EXPL: 0

The BMP image processor for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted BMP file. El procesador de imágenes BMP de (1) gdk-pixbuf anteriores a 0.22 y (2) gtk2 anteriores a 2.2.4 permite a atacantes remotos causar una denegación de servicio (bucle infinito) mediante un fichero BMP artesanal. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 http://secunia.com/advisories/17657 http://www.debian.org/security/2004/dsa-546 http://www.kb.cert.org/vuls/id/825374 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 http://www.redhat.com/support/errata/RHSA-2004-447.html http://www.redhat.com/support/errata/RHSA-2004-466.html http://www.securityfocus.com/archive • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 30%CPEs: 9EXPL: 0

Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687). Desbordamiento de enteros en pixbuf_create_from_xpm (io-xpm.c) en el decodificador de imágenes XPM de gtk+ 2.4.4 (gtk2) y anteriores, y gdk-pixbuf anteriores a 0.22 permite a atacantes remotos ejecutar código de su elección mediante ciertos valores n_col y cpp que permiten un desbordamiento de búfer basado en el montón. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 http://marc.info/?l=bugtraq&m=109528994916275&w=2 http://scary.beasts.org/security/CESA-2004-005.txt http://secunia.com/advisories/17657 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 http://www.debian.org/security/2004/dsa-546 http://www.kb.cert.org/vuls/id/729894 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 http://www.mandriva.com/security/advisories •

CVSS: 7.5EPSS: 30%CPEs: 9EXPL: 0

Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688). Vulnerabilidad basada en la pila en xpm_extract_color (io-xpm.c) en el decodificador de imagen XPM de gtk+ 2.4.4 (gtk2) y anteriores, y gdk-pixbuf anteriores a 0.22, puede permitir a atacantes remtoso ejecutar código arbitrario mediante una cierta cadena de color. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 http://marc.info/?l=bugtraq&m=109528994916275&w=2 http://scary.beasts.org/security/CESA-2004-005.txt http://secunia.com/advisories/17657 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 http://www.kb.cert.org/vuls/id/369358 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 http://www.mandrakesecure.net/en/advisories/advisory.php? • CWE-787: Out-of-bounds Write •

CVSS: 5.0EPSS: 17%CPEs: 5EXPL: 0

Integer overflow in the ICO image decoder for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted ICO file. Vulnerabilidad de desbordamiento de enteros en el decodificador de imagen ICO de (1) gdk-pixbuf anteriores a 0.22 y (2) gtk2 anteriores a 2.2.4 permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante un fichero ICO artesanal. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 http://secunia.com/advisories/17657 http://www.debian.org/security/2004/dsa-546 http://www.kb.cert.org/vuls/id/577654 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 http://www.redhat.com/support/errata/RHSA-2004-447.html http://www.redhat.com/support/errata/RHSA-2004-466.html http://www.securityfocus.com/archive • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 3

GTK+ library allows local users to specify arbitrary modules via the GTK_MODULES environmental variable, which could allow local users to gain privileges if GTK+ is used by a setuid/setgid program. • https://www.exploit-db.com/exploits/20526 http://archives.neohapsis.com/archives/bugtraq/2000-12/0498.html http://archives.neohapsis.com/archives/bugtraq/2001-01/0027.html http://www.gtk.org/setuid.html http://www.securityfocus.com/bid/2165 •