CVE-2010-1510
https://notcve.org/view.php?id=CVE-2010-1510
Heap-based buffer overflow in IrfanView before 4.27 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PSD image with RLE compression. Desbordamiento de búfer basado en memoria dinámica en IrfanView en versiones anteriores a la 4.27 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente ejecutar código de su elección mediante una imagen PSD manipulada con compresión RLE. • http://irfanview.com/main_history.htm http://osvdb.org/64628 http://secunia.com/advisories/39036 http://secunia.com/secunia_research/2010-42 http://www.securityfocus.com/archive/1/511275/100/0/threaded http://www.securityfocus.com/bid/40105 https://exchange.xforce.ibmcloud.com/vulnerabilities/58549 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7397 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-1509
https://notcve.org/view.php?id=CVE-2010-1509
IrfanView before 4.27 does not properly handle an unspecified integer variable during processing of PSD images, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow, related to a "sign-extension error." IrfanView en versiones anteriores a la 4.27 no maneja adecuadamente una variable de entero no especificada durante el procesamiento de imagenes PSD ,lo que permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente ejecutar código de su elección mediante un fichero de imagen manipulado que dispara un desbordamiento de búfer basado en memoria dinámica, relacionado con "sign-extension error." • http://irfanview.com/main_history.htm http://osvdb.org/64627 http://secunia.com/advisories/39036 http://secunia.com/secunia_research/2010-41 http://www.securityfocus.com/archive/1/511274/100/0/threaded http://www.securityfocus.com/bid/40104 https://exchange.xforce.ibmcloud.com/vulnerabilities/58548 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6705 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2009-2118
https://notcve.org/view.php?id=CVE-2009-2118
Integer overflow in IrfanView 4.23, when the resampling or screen fitting option is enabled, allows remote attackers to execute arbitrary code via a crafted TIFF 1 BPP image, which triggers a heap-based buffer overflow. Desbordamiento de entero en IrfanView v4.23, cuando las opciones de resampleo o de ajustar a pantalla permite a atacantes remotos ejecutar código de su elección a través de una imagen TIFF 1 BPP manipulada, lo que provoca un desbordamiento de búfer basado en memoria dinámica (heap). • http://osvdb.org/55150 http://secunia.com/advisories/35359 http://www.irfanview.com/main_history.htm http://www.securityfocus.com/bid/35423 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2009-0197
https://notcve.org/view.php?id=CVE-2009-0197
Integer overflow in the FORMATS Plugin before 4.23 for IrfanView allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large XPM file that triggers a heap-based buffer overflow. Desbordamiento de entero en el Plugin FORMATS anteriores a v4.23 para IrfanView permite atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (caída de aplicación) a través de un fichero XPM grande, que provoca un desbordamiento de búfer basado en montículo. • http://secunia.com/advisories/34525 http://secunia.com/secunia_research/2009-20 http://www.irfanview.com/plugins.htm http://www.osvdb.org/53323 http://www.securityfocus.com/archive/1/502516/100/0/threaded http://www.securityfocus.com/bid/34402 http://www.vupen.com/english/advisories/2009/0953 https://exchange.xforce.ibmcloud.com/vulnerabilities/49717 • CWE-189: Numeric Errors •
CVE-2008-0493 – IrfanView 4.10 - '.fpx' Memory Corruption
https://notcve.org/view.php?id=CVE-2008-0493
fpx.dll 3.9.8.0 in the FlashPix plugin for IrfanView 4.10 allows remote attackers to execute arbitrary code via a crafted FlashPix (.FPX) file, which triggers heap corruption. NOTE: some of these details are obtained from third party information. fpx.dll 3.9.8.0 en el plugin FlashPix para IrfanView 4.10 permite a atacantes remotos ejecutar código arbitrario a través de un archivo FlashPix (.FPX)manipulado, que provoca una corrupción de pila. NOTA: algunos de estos detalles se obtienen a partir de información de terceros. • https://www.exploit-db.com/exploits/4998 http://secunia.com/advisories/28688 http://www.securityfocus.com/bid/27479 http://www.vupen.com/english/advisories/2008/0318 https://exchange.xforce.ibmcloud.com/vulnerabilities/40012 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •