Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0733

Опубликовано: 23 мар. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9.3

Описание

Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions.

РелизСтатусПримечание
dapper

released

1.13-1ubuntu0.2
devel

released

1.17.dfsg-1ubuntu2
gutsy

released

1.16-5ubuntu3.2
hardy

released

1.16-7ubuntu1.2
intrepid

released

1.16-10ubuntu0.2
upstream

released

1.18beta2

Показывать по

EPSS

Процентиль: 82%
0.01738
Низкий

9.3 Critical

CVSS2

Связанные уязвимости

redhat
больше 16 лет назад

Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions.

nvd
больше 16 лет назад

Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions.

debian
больше 16 лет назад

Multiple stack-based buffer overflows in the ReadSetOfCurves function ...

github
больше 3 лет назад

Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions.

oracle-oval
больше 16 лет назад

ELSA-2009-0339: lcms security update (MODERATE)

EPSS

Процентиль: 82%
0.01738
Низкий

9.3 Critical

CVSS2