CVE-2014-9763
https://notcve.org/view.php?id=CVE-2014-9763
imlib2 before 1.4.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted PNM file. imlib2 en versiones anteriores a 1.4.7 permite a atacantes remotos provocar una denegación de servicio (error de división por cero y caída de aplicación) a través de un archivo PNM manipulado. • http://lists.opensuse.org/opensuse-updates/2016-05/msg00076.html http://www.debian.org/security/2016/dsa-3537 http://www.securityfocus.com/bid/90955 https://git.enlightenment.org/legacy/imlib2.git/commit/?h=v1.4.7&id=c21beaf1780cf3ca291735ae7d58a3dde63277a2 https://git.enlightenment.org/legacy/imlib2.git/tree/ChangeLog https://security.gentoo.org/glsa/201611-12 • CWE-189: Numeric Errors •
CVE-2014-9764
https://notcve.org/view.php?id=CVE-2014-9764
imlib2 before 1.4.7 allows remote attackers to cause a denial of service (segmentation fault) via a crafted GIF file. imlib2 en versiones anteriores a 1.4.7 permite a atacantes remotos provocar una denegación de servicio (fallo de segmentación) a través de un archivo GIF manipulado. • http://lists.opensuse.org/opensuse-updates/2016-05/msg00076.html http://www.debian.org/security/2016/dsa-3537 http://www.securityfocus.com/bid/90962 https://git.enlightenment.org/legacy/imlib2.git/commit/?h=v1.4.7&id=1f9b0b32728803a1578e658cd0955df773e34f49 https://git.enlightenment.org/legacy/imlib2.git/tree/ChangeLog https://security.gentoo.org/glsa/201611-12 • CWE-20: Improper Input Validation •
CVE-2010-0991
https://notcve.org/view.php?id=CVE-2010-0991
Multiple heap-based buffer overflows in imlib2 1.4.3 allow context-dependent attackers to execute arbitrary code via a crafted (1) ARGB, (2) XPM, or (3) BMP file, related to the IMAGE_DIMENSIONS_OK macro in lib/image.h. Multiples desbordamientos de búfer basado en memoria dinámica (heap) en imlib2 v1.4.3 permite a atacantes dependientes del contexto ejecutar código de su elección a través de ficheros (1) ARGB, (2) XPM, o (3) BMP manipulados, relacionado con la macro IMAGE_DIMENSIONS_OK en lib/image.h. • http://secunia.com/advisories/39354 http://secunia.com/secunia_research/2010-54 http://www.securityfocus.com/archive/1/510866/100/0/threaded http://www.vupen.com/english/advisories/2010/0959 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-6079
https://notcve.org/view.php?id=CVE-2008-6079
imlib2 before 1.4.2 allows context-dependent attackers to have an unspecified impact via a crafted (1) ARGB, (2) BMP, (3) JPEG, (4) LBM, (5) PNM, (6) TGA, or (7) XPM file, related to "several heap and stack based buffer overflows - partly due to integer overflows." Múltiples vulnerabilidades no especificadas en mlib2 anterior a v1.4.2 tienen un impacto y vectores de ataque desconocidos. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576469 http://secunia.com/advisories/32354 http://secunia.com/advisories/39340 http://sourceforge.net/project/shownotes.php?release_id=634778 http://www.debian.org/security/2010/dsa-2029 http://www.securityfocus.com/bid/31880 http://www.vupen.com/english/advisories/2008/2898 http://www.vupen.com/english/advisories/2010/0803 https://exchange.xforce.ibmcloud.com/vulnerabilities/46037 •
CVE-2008-5187
https://notcve.org/view.php?id=CVE-2008-5187
The load function in the XPM loader for imlib2 1.4.2, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XPM file that triggers a "pointer arithmetic error" and a heap-based buffer overflow, a different vulnerability than CVE-2008-2426. La función de carga en el cargador XPM para imlib2 v1.4.2, y posiblemente otras versiones, que permite a atacantes producir una denegación de servicio (caída) y posiblemente una ejecución de código a elección del atacante a través de un fichero XPM que dispara un "error aritmético de puntero" desbordamiento de búfer basado en montículo, se trata de una vulnerabilidad diferente de CVE-2008-2426. NOTA: La procedencia de la información es desconocida; Los detalles han sido obtenidos únicamente de una tercera parte. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505714#15 http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html http://osvdb.org/49970 http://secunia.com/advisories/32796 http://secunia.com/advisories/32843 http://secunia.com/advisories/32949 http://secunia.com/advisories/32963 http://secunia.com/advisories/33323 http://secunia.com/advisories/33568 http://security.gentoo.org/glsa/glsa-200812-23.xml http://www.debian.org/security/2008/dsa-1672 http • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •