2 results (0.015 seconds)

CVSS: 7.5EPSS: 19%CPEs: 4EXPL: 0

Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, and (6) imagemagick allows remote attackers to execute arbitrary code via the MaxRecordSize header field in a WMF file. Desbordamiento de entero en el archivo player.c en libwmf 0.2.8.4, utilizado en múltiples productos incluyendo (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, y(6) imagemagick, que permite a los atacantes remotos ejecutar arbitrariamente código a través del campo cabecera MaxRecordSize en un archivo WMF. • http://rhn.redhat.com/errata/RHSA-2006-0597.html http://secunia.com/advisories/20921 http://secunia.com/advisories/21064 http://secunia.com/advisories/21261 http://secunia.com/advisories/21419 http://secunia.com/advisories/21459 http://secunia.com/advisories/21473 http://secunia.com/advisories/22311 http://security.gentoo.org/glsa/glsa-200608-17.xml http://securityreason.com/securityalert/1190 http://securitytracker.com/id?1016518 http://www.mandriva.com/security/advisories?na •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Integer overflow in wv2 before 0.2.3 might allow context-dependent attackers to execute arbitrary code via a crafted Microsoft Word document. Desbordamiento de entero en WV2 anterior a v0.2.3 podría permitir a atacantes dependientes de contexto para ejecutar código arbitrario a través de un documento de Microsoft Word. • http://secunia.com/advisories/20665 http://secunia.com/advisories/20688 http://secunia.com/advisories/20689 http://secunia.com/advisories/20826 http://secunia.com/advisories/20844 http://secunia.com/advisories/20899 http://securitytracker.com/id?1016313 http://sourceforge.net/project/shownotes.php?group_id=10501&release_id=424094 http://www.debian.org/security/2006/dsa-1100 http://www.gentoo.org/security/en/glsa/glsa-200606-24.xml http://www.mandriva.com/security/advisories? • CWE-189: Numeric Errors •