Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8fr7-79w9-7h79

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple integer overflows in src/image.c in Ziproxy before 3.0.1 allow remote attackers to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer overflows.

Multiple integer overflows in src/image.c in Ziproxy before 3.0.1 allow remote attackers to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer overflows.

EPSS

Процентиль: 87%
0.03203
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

Multiple integer overflows in src/image.c in Ziproxy before 3.0.1 allow remote attackers to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer overflows.

nvd
больше 15 лет назад

Multiple integer overflows in src/image.c in Ziproxy before 3.0.1 allow remote attackers to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer overflows.

debian
больше 15 лет назад

Multiple integer overflows in src/image.c in Ziproxy before 3.0.1 allo ...

EPSS

Процентиль: 87%
0.03203
Низкий