CVE-2008-2427 – XnView 1.93.6 - '.taac' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2008-2427
Stack-based buffer overflow in NConvert 4.92, GFL SDK 2.82, and XnView 1.93.6 on Windows and 1.70 on Linux and FreeBSD allows user-assisted remote attackers to execute arbitrary code via a crafted format keyword in a Sun TAAC file. Desbordamiento de búfer basado en Pila en NConvert 4.92, GFL SDK 2.82, y XnView 1.93.6 sobre Windows y 1.70 sobre Linux y FreeBSD, lo que permite a los atacantes remotos asistidos por usuarios para ejecutar código arbitrario a través de un formato clave manipuda en un fichero Sun TAAC. • https://www.exploit-db.com/exploits/5951 http://secunia.com/advisories/30416 http://secunia.com/advisories/30789 http://secunia.com/secunia_research/2008-24/advisory http://securityreason.com/securityalert/3956 http://securitytracker.com/id?1020340 http://www.securityfocus.com/archive/1/493505/100/0/threaded http://www.securityfocus.com/bid/29851 http://www.vupen.com/english/advisories/2008/1896 http://www.vupen.com/english/advisories/2008/1897 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-0069 – XnView 1.92.1 - 'FontName' Slideshow Buffer Overflow
https://notcve.org/view.php?id=CVE-2008-0069
Stack-based buffer overflow in XnView 1.92 and 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long FontName parameter in a slideshow (.sld) file, a different vector than CVE-2008-1461. Desbordamiento de búfer basado en pila en XnView 1.92 y 1.92.1 permite a a atacantes remotos ayudados por el usuario ejecutar código de su elección a través de un parámetro FontName largo en un fichero slideshow (.sld), un vector distinto a CVE-2008-1461. • https://www.exploit-db.com/exploits/5346 http://secunia.com/advisories/29620 http://secunia.com/secunia_research/2008-6/advisory http://www.securityfocus.com/bid/28579 http://www.vupen.com/english/advisories/2008/1044/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41542 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-1461 – XnView 1.92.1 - Command-Line Arguments Buffer Overflow
https://notcve.org/view.php?id=CVE-2008-1461
Buffer overflow in XnView 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long filename argument on the command line. NOTE: it is unclear whether there are common handler configurations in which this argument is controlled by an attacker. Desbordamiento de búfer en XnView 1.92.1 permite a atacantes remotos ayudados por elme usuario ejecutar código de su elección a través de un argumento nombre de archivo largo en la línea de comandos. NOTA: no está claro si hay configuraciones del gestor común en los que este argumento sea controlado por un atacante. • https://www.exploit-db.com/exploits/31405 http://securityreason.com/securityalert/3761 http://www.click-internet.fr/index.php?cki=News&news=9 http://www.securityfocus.com/archive/1/489658/100/0/threaded http://www.securityfocus.com/bid/28259 https://exchange.xforce.ibmcloud.com/vulnerabilities/41245 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-0064
https://notcve.org/view.php?id=CVE-2008-0064
Stack-based buffer overflow in Pierre-emmanuel Gougelet (1) XnView 1.91 and 1.92, (2) NConvert 4.85, and (3) libgfl280.dll in GFL SDK 2.870 for Windows allows user-assisted remote attackers to execute arbitrary code via a crafted Radiance RGBE (.hdr) file. Desbordamiento de búfer basado en pila en Pierre-emmanuel Gougelet (1) XnView 1.91 y 1.92, (2) NConvert 4.85 y (3) libgfl280.dll en GFL SDK 2.870 para Windows. Permite a atacantes remotos con colaboración del usuario ejecutar código arbitrario a través de un archivo Radiance RGBE (.hdr) manipulado. • http://secunia.com/advisories/28326 http://secunia.com/advisories/28710 http://secunia.com/secunia_research/2008-1/advisory http://www.securityfocus.com/bid/27514 http://www.vupen.com/english/advisories/2008/0328 http://www.vupen.com/english/advisories/2008/0329 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-2194 – XnView 1.90.3 - '.xpm' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-2194
Stack-based buffer overflow in XnView 1.90.3 allows user-assisted remote attackers to execute arbitrary code via a crafted XPM file with a long section string. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer basado en pila en XnView 1.90.3 permite a atacantes con la intervención del usuario ejecutar código de su elección a través de ficheros XPM manipulados con una sección de cadena larga. NOTA: algunos de los detalles fueron obtenidos de terceras fuentes de información. • https://www.exploit-db.com/exploits/3777 http://osvdb.org/35235 http://secunia.com/advisories/24973 http://secunia.com/advisories/26006 http://security.gentoo.org/glsa/glsa-200707-06.xml http://www.securityfocus.com/bid/23625 http://www.vupen.com/english/advisories/2007/1488 https://exchange.xforce.ibmcloud.com/vulnerabilities/33810 •