2 results (0.011 seconds)

CVSS: 9.3EPSS: 23%CPEs: 1EXPL: 0

Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow. Desbordamiento inferior de búfer en X MultiMedia System (xmms) 1.2.10 permite a atacantes remotos con la intervención del usuario ejecutar código de su elección mediante información de cabecera manipulada en una imagen de mapa de bits de una piel (skin), que resulta en un desbordamiento de búfer basado en pila. • http://secunia.com/advisories/23986 http://secunia.com/advisories/24645 http://secunia.com/advisories/24804 http://secunia.com/advisories/24889 http://secunia.com/secunia_research/2007-47/advisory http://www.debian.org/security/2007/dsa-1277 http://www.mandriva.com/security/advisories?name=MDKSA-2007:071 http://www.novell.com/linux/security/advisories/2007_6_sr.html http://www.securityfocus.com/archive/1/463408/100/0/threaded http://www.securityfocus.com/bid/23078 http:&# •

CVSS: 9.3EPSS: 28%CPEs: 2EXPL: 0

Integer overflow in X MultiMedia System (xmms) 1.2.10, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which triggers memory corruption. Desbordamiento de enteros en el X MultiMedia System (xmms) 1.2.10 y, posiblemente, otras versiones, permite a atacantes con la intervención del usuario ejecutar código de su elección mediante una cabecera de información manipulada en una imagen de bits de la piel (skin), lo que dispara una corrupción de memoria. • http://secunia.com/advisories/23986 http://secunia.com/advisories/24645 http://secunia.com/advisories/24804 http://secunia.com/advisories/24889 http://secunia.com/secunia_research/2007-47/advisory http://www.debian.org/security/2007/dsa-1277 http://www.mandriva.com/security/advisories?name=MDKSA-2007:071 http://www.novell.com/linux/security/advisories/2007_6_sr.html http://www.securityfocus.com/archive/1/463408/100/0/threaded http://www.securityfocus.com/bid/23078 http:&# •