CVE-2008-1461 – XnView 1.92.1 - Command-Line Arguments Buffer Overflow
https://notcve.org/view.php?id=CVE-2008-1461
Buffer overflow in XnView 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long filename argument on the command line. NOTE: it is unclear whether there are common handler configurations in which this argument is controlled by an attacker. Desbordamiento de búfer en XnView 1.92.1 permite a atacantes remotos ayudados por elme usuario ejecutar código de su elección a través de un argumento nombre de archivo largo en la línea de comandos. NOTA: no está claro si hay configuraciones del gestor común en los que este argumento sea controlado por un atacante. • https://www.exploit-db.com/exploits/31405 http://securityreason.com/securityalert/3761 http://www.click-internet.fr/index.php?cki=News&news=9 http://www.securityfocus.com/archive/1/489658/100/0/threaded http://www.securityfocus.com/bid/28259 https://exchange.xforce.ibmcloud.com/vulnerabilities/41245 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-0064
https://notcve.org/view.php?id=CVE-2008-0064
Stack-based buffer overflow in Pierre-emmanuel Gougelet (1) XnView 1.91 and 1.92, (2) NConvert 4.85, and (3) libgfl280.dll in GFL SDK 2.870 for Windows allows user-assisted remote attackers to execute arbitrary code via a crafted Radiance RGBE (.hdr) file. Desbordamiento de búfer basado en pila en Pierre-emmanuel Gougelet (1) XnView 1.91 y 1.92, (2) NConvert 4.85 y (3) libgfl280.dll en GFL SDK 2.870 para Windows. Permite a atacantes remotos con colaboración del usuario ejecutar código arbitrario a través de un archivo Radiance RGBE (.hdr) manipulado. • http://secunia.com/advisories/28326 http://secunia.com/advisories/28710 http://secunia.com/secunia_research/2008-1/advisory http://www.securityfocus.com/bid/27514 http://www.vupen.com/english/advisories/2008/0328 http://www.vupen.com/english/advisories/2008/0329 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-2194 – XnView 1.90.3 - '.xpm' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-2194
Stack-based buffer overflow in XnView 1.90.3 allows user-assisted remote attackers to execute arbitrary code via a crafted XPM file with a long section string. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer basado en pila en XnView 1.90.3 permite a atacantes con la intervención del usuario ejecutar código de su elección a través de ficheros XPM manipulados con una sección de cadena larga. NOTA: algunos de los detalles fueron obtenidos de terceras fuentes de información. • https://www.exploit-db.com/exploits/3777 http://osvdb.org/35235 http://secunia.com/advisories/24973 http://secunia.com/advisories/26006 http://security.gentoo.org/glsa/glsa-200707-06.xml http://www.securityfocus.com/bid/23625 http://www.vupen.com/english/advisories/2007/1488 https://exchange.xforce.ibmcloud.com/vulnerabilities/33810 •
CVE-2005-4595
https://notcve.org/view.php?id=CVE-2005-4595
Untrusted search path vulnerability (RPATH) in XnView 1.70 and NView 4.51 on Gentoo Linux allows local users to execute arbitrary code via a malicious library in the current working directory. • http://bugs.gentoo.org/show_bug.cgi?id=117063 http://secunia.com/advisories/18235 http://secunia.com/advisories/18240 http://www.gentoo.org/security/en/glsa/glsa-200512-18.xml http://www.osvdb.org/22093 http://www.osvdb.org/22094 http://www.securityfocus.com/bid/16087 https://exchange.xforce.ibmcloud.com/vulnerabilities/23910 •