Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-1097

Опубликовано: 05 мар. 2008
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8

Описание

Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

edgy

ignored

end of life, was needed
feisty

not-affected

gutsy

not-affected

hardy

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

edgy

not-affected

feisty

ignored

end of life, was needed
gutsy

not-affected

hardy

not-affected

upstream

needs-triage

Показывать по

Ссылки на источники

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 18 лет назад

Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.

nvd
больше 17 лет назад

Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.

debian
больше 17 лет назад

Heap-based buffer overflow in the ReadPCXImage function in the PCX cod ...

github
около 3 лет назад

Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.

oracle-oval
около 17 лет назад

ELSA-2008-0145: ImageMagick security update (MODERATE)

6.8 Medium

CVSS2