Описание
Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-0654
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33203
- http://secunia.com/advisories/23986
- http://secunia.com/advisories/24645
- http://secunia.com/advisories/24804
- http://secunia.com/advisories/24889
- http://secunia.com/secunia_research/2007-47/advisory
- http://www.debian.org/security/2007/dsa-1277
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:071
- http://www.novell.com/linux/security/advisories/2007_6_sr.html
- http://www.securityfocus.com/archive/1/463408/100/0/threaded
- http://www.securityfocus.com/bid/23078
- http://www.ubuntu.com/usn/usn-445-1
- http://www.vupen.com/english/advisories/2007/1057
EPSS
CVE ID
Связанные уязвимости
Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-ass ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS