CVE-2007-2931 – Microsoft MSN Messenger 8.0 - Video Conversation Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-2931
Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions. Un desbordamiento de búfer en la región heap de la memoria en Microsoft MSN Messenger versiones 6.2, 7.0 y 7.5, y Live Messenger versión 8.0 permite a atacantes remotos asistidos por el usuario ejecutar código arbitrario por medio de vectores no especificados que involucran el manejo de conversación de video en Web Cam y sesiones de video chat. • https://www.exploit-db.com/exploits/30537 https://www.exploit-db.com/exploits/4334 http://osvdb.org/40126 http://secunia.com/advisories/26570 http://www.kb.cert.org/vuls/id/166521 http://www.securityfocus.com/bid/25461 http://www.securitytracker.com/id?1018622 http://www.team509.com/modules.php?name=News&file=article&sid=50 http://www.us-cert.gov/cas/techalerts/TA07-254A.html http://www.vupen.com/english/advisories/2007/2987 https://docs.microsoft.com/en • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2005-0562
https://notcve.org/view.php?id=CVE-2005-0562
GIF file validation error in MSN Messenger 6.2 allows remote attackers in a user's contact list to execute arbitrary code via a GIF image with an improper height and width. • http://secunia.com/advisories/14915 http://www.kb.cert.org/vuls/id/633446 http://www.us-cert.gov/cas/techalerts/TA05-102A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-022 https://exchange.xforce.ibmcloud.com/vulnerabilities/19950 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4927 •
CVE-2004-0597 – LibPNG 1.2.5 - 'png_jmpbuf()' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-0597
Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking. • https://www.exploit-db.com/exploits/393 https://www.exploit-db.com/exploits/389 https://www.exploit-db.com/exploits/25094 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000856 http://lists.apple.com/mhonarc/security-announce/msg00056.html http://marc.info/?l=bugtraq&m=109163866717909&w=2 http://marc.info/?l=bugtraq&m=109181639602978&w=2 http://marc.info/?l=bugtraq&m=1097612393 •