CVE-2016-4024
https://notcve.org/view.php?id=CVE-2016-4024
Integer overflow in imlib2 before 1.4.9 on 32-bit platforms allows remote attackers to execute arbitrary code via large dimensions in an image, which triggers an out-of-bounds heap memory write operation. Desbordamiento de entero en imlib2 en versiones anteriores a 1.4.9 en plataformas de 32-bit permite a atacantes remotos ejecutar código arbitrario a través de una imagen de grandes dimensiones, lo que desencadena una operación de escritura de memoria dinámica fuera de límites. • http://lists.opensuse.org/opensuse-updates/2016-05/msg00076.html http://www.debian.org/security/2016/dsa-3555 http://www.securityfocus.com/bid/86073 http://www.securitytracker.com/id/1035573 https://git.enlightenment.org/legacy/imlib2.git/commit/?id=7eba2e4c8ac0e20838947f10f29d0efe1add8227 https://security.gentoo.org/glsa/201611-12 https://sourceforge.net/p/enlightenment/mailman/message/35055012 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-3074 – libgd 2.1.1 - Signedness Heap Overflow
https://notcve.org/view.php?id=CVE-2016-3074
Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow. Error de entero sin signo en GD Graphics Library 2.1.1 (también conocida como libgd o libgd2) permite a atacantes remotos provocar una denegación de servicio (caída) o potencialmente ejecutar código arbitrario a través de datos gd2 comprimidos manipulados, lo que desencadena un desbordamiento de buffer basado en memoria dinámica. A signedness vulnerability exists in libgd version 2.1.1 which may result in a heap overflow when processing compressed gd2 data. • https://www.exploit-db.com/exploits/39736 http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/fulldisclosure/2016/Apr/72 http://www.debian.org/security/2016/dsa-3556 http& • CWE-122: Heap-based Buffer Overflow CWE-681: Incorrect Conversion between Numeric Types •
CVE-2016-3977
https://notcve.org/view.php?id=CVE-2016-3977
Heap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file. Desbordamiento de buffer basado en memoria dinámica en util/gif2rgb.c en gif2rgb en giflib 5.1.2 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través del índice del color de fondo en un archivo GIF. • http://bugs.fi/fuzzing/index.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00079.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00084.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00019.html http://www.securityfocus.com/bid/88103 https://bugzilla.redhat.com/show_bug.cgi?id=1325771 https://sourceforge.net/p/giflib/bugs/87 https://sourceforge.net/p/giflib/code/ci/ea8dbc5786862a3e16a5acfa3d24e2c2f608cd88 https://usn.ubuntu.com/4107-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-3190
https://notcve.org/view.php?id=CVE-2016-3190
The fill_xrgb32_lerp_opaque_spans function in cairo-image-compositor.c in cairo before 1.14.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a negative span length. La función fill_xrgb32_lerp_opaque_spans en cairo-image-compositor.c en cairo en versiones anteriores a 1.14.2 permite a atacantes remotos provocar una denegación de servicio (lectura fuera de límites y caída de aplicación) a través de una longitud negativa de span. • http://lists.opensuse.org/opensuse-updates/2016-04/msg00029.html https://bugzilla.redhat.com/show_bug.cgi?id=1318977 https://cgit.freedesktop.org/cairo/patch/src/cairo-image-compositor.c?id=5c82d91a5e15d29b1489dcb413b24ee7fdf59934 https://mail.gnome.org/archives/gnome-announce-list/2015-March/msg00047.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-0668 – mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU April 2016)
https://notcve.org/view.php?id=CVE-2016-0668
Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB. Vulnerabilidad no especificada en Oracle MySQL 5.6.28 y versiones anteriores y 5.7.10 y versiones anteriores y MariaDB 10.0.x en versiones anteriores a 10.0.24 y 10.1.x en versiones anteriores a 10.1.12 permite a usuarios locales afectar la disponibilidad a través de vectores relacionados con InnoDB. • http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/tech •