CVE-2012-0025 – IrfanView FlashPix PlugIn - Double-Free
https://notcve.org/view.php?id=CVE-2012-0025
Double free vulnerability in the Free_All_Memory function in jpeg/dectile.c in libfpx before 1.3.1-1, as used in the FlashPix PlugIn 4.2.2.0 for IrfanView, allows remote attackers to cause a denial of service (crash) via a crafted FPX image. Vulnerabilidad de doble liberación en la función Free_All_Memory en jpeg/dectile.c en libfpx antes de v1.3.1-1, tal y como se utiliza en el complemento FlashPix v4.2.2.0 para IrfanView, permite a atacantes remotos provocar una denegación de servicio (caída) a través de una imagen FPX modificada. • https://www.exploit-db.com/exploits/18256 http://secunia.com/advisories/47246 http://secunia.com/advisories/47322 http://www.exploit-db.com/exploits/18256 http://www.imagemagick.org/download/delegates/libfpx-1.3.1-1.zip http://www.openwall.com/lists/oss-security/2012/01/03/16 http://www.openwall.com/lists/oss-security/2012/11/02/6 http://www.osvdb.org/77958 http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=31&Itemid=31 https:// • CWE-399: Resource Management Errors •
CVE-2011-5233 – IrfanView - '.tiff' Image Processing Buffer Overflow
https://notcve.org/view.php?id=CVE-2011-5233
Heap-based buffer overflow in IrfanView before 4.32 allows remote attackers to execute arbitrary code via crafted "Rows Per Strip" and "Samples Per Pixel" values in a TIFF image file. Desbordamiento de búfer basado en memoria dinámica en IrfanView anteriores a v4.32, permite a atacantes remotos a ejecutar código a través de los valores "Rows Per Strip" y "Samples Per Pixel" en un fichero de imagen TIFF. • https://www.exploit-db.com/exploits/18257 http://secunia.com/advisories/47065 http://www.exploit-db.com/exploits/18257 http://www.irfanview.com/history_old.htm http://www.osvdb.org/77957 http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=30&Itemid=30 https://exchange.xforce.ibmcloud.com/vulnerabilities/71891 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-3585 – IrfanView JLS Formats PlugIn - Heap Overflow
https://notcve.org/view.php?id=CVE-2012-3585
Heap-based buffer overflow in jpeg_ls.dll in the Jpeg_LS (aka JLS) plugin in the formats plugins in IrfanView PlugIns before 4.34 allows remote attackers to execute arbitrary code via a crafted JLS file. Un desbordamiento de bufer basado en memoria dinámica (heap) en jpeg_ls.dll en el 'plugin' Jpeg_LS (también conocido como JLS) en los plugins de formatos de IrfanView v4.34 permite a atacantes remotos ejecutar código de su elección mediante un archivo de JLS modificado para este fin. • https://www.exploit-db.com/exploits/19483 http://archives.neohapsis.com/archives/bugtraq/2012-06/0191.html http://www.reactionpenetrationtesting.co.uk/Irfanview-JLS-Heap-Overflow.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-0278 – IrfanView FlashPix PlugIn - Decompression Heap Overflow
https://notcve.org/view.php?id=CVE-2012-0278
Heap-based buffer overflow in the FlashPix PlugIn before 4.3.4.0 for IrfanView might allow remote attackers to execute arbitrary code via a .fpx file containing a crafted FlashPix image that is not properly handled during decompression. Desbordamiento de búfer basado en memoria dinámica en FlashPix PlugIn antes de v4.3.4.0 para IrfanView, podría permitir a atacantes remotos ejecutar código arbitrario mediante un archivo .FPX que contiene una imagen FlashPix manipulada que no se maneja adecuadamente durante la descompresión. • https://www.exploit-db.com/exploits/18739 http://secunia.com/advisories/48772 http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=41&Itemid=41 http://www.securityfocus.com/bid/53009 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-0897 – IrfanView JPEG2000 4.3.2.0 - jp2 Stack Buffer Overflow
https://notcve.org/view.php?id=CVE-2012-0897
Stack-based buffer overflow in the JPEG2000 plugin in IrfanView PlugIns before 4.33 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment. Desbordamiento de búfer basado en pila en el complemento JPEG2000 para IrfanView PlugIns, permite a atacantes remotos ejecutar código de su elección a través de un archivo JPEG2000 (JP2) con un marcador de segmento Quantization Default (QCD) manipulado. Printer virtualization under VMware Workstation involves a vprintproxy.exe process launched by vmware-vmx.exe on the Host. It will receive and process EMFSPOOL files sent by a Guest on its COM1 port, if a virtual printer has been added to the VM hardware (default). Several vulnerabilities in this component allow an unprivileged Guest user to execute code on the Host. • https://www.exploit-db.com/exploits/19519 http://osvdb.org/78333 http://secunia.com/advisories/47360 http://www.irfanview.com/history_old.htm http://www.securityfocus.com/bid/51426 http://www.securitytracker.com/id/1032529 http://www.securitytracker.com/id/1032530 https://exchange.xforce.ibmcloud.com/vulnerabilities/72398 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •