Page 3 of 11 results (0.000 seconds)

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 1

Buffer overflow in the BMP reader in OptiPNG 0.6 and 0.6.1 allows user-assisted attackers to execute arbitrary code via a crafted BMP image, related to an "array overflow." Desbordamiento de búfer en el lector BMP en OptiPNG v0.6 y v0.6.1 permite a atacantes con usuario asistido ejecutar código de su elección a través de una imagen BMP manipulada, relacionado con un "desbordamiento de array". • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505399 http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html http://openwall.com/lists/oss-security/2008/11/12/1 http://optipng.sourceforge.net http://prdownloads.sourceforge.net/optipng/optipng-0.6.1.1.diff?download http://secunia.com/advisories/32651 http://secunia.com/advisories/34259 http://security.gentoo.org/glsa/glsa-200812-01.xml http://sourceforge.net/project/shownotes.php?release_id=639631&group_id= • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •