Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-2295

Опубликовано: 05 июл. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5

Описание

Multiple integer overflows in CamlImages 2.2 and earlier might allow context-dependent attackers to execute arbitrary code via a crafted PNG image with large width and height values that trigger a heap-based buffer overflow in the (1) read_png_file or (2) read_png_file_as_rgb24 function.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

hardy

released

1.6.0-13ubuntu0.1
intrepid

ignored

end of life, was needs-triage
jaunty

released

1.6.0-13+lenny2build0.9.04.1
karmic

released

1.6.0-14ubuntu0.1
lucid

not-affected

maverick

not-affected

upstream

released

1.6.0-15

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

hardy

released

1:2.2.0-2ubuntu2.1
intrepid

released

1:2.2.0-3ubuntu0.1
jaunty

released

1:2.2.0-4+lenny2build0.9.04.1
karmic

not-affected

lucid

not-affected

maverick

not-affected

upstream

released

1:3.0.1-3

Показывать по

Ссылки на источники

EPSS

Процентиль: 79%
0.01223
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
больше 16 лет назад

Multiple integer overflows in CamlImages 2.2 and earlier might allow context-dependent attackers to execute arbitrary code via a crafted PNG image with large width and height values that trigger a heap-based buffer overflow in the (1) read_png_file or (2) read_png_file_as_rgb24 function.

debian
больше 16 лет назад

Multiple integer overflows in CamlImages 2.2 and earlier might allow c ...

github
почти 4 года назад

Multiple integer overflows in CamlImages 2.2 and earlier might allow context-dependent attackers to execute arbitrary code via a crafted PNG image with large width and height values that trigger a heap-based buffer overflow in the (1) read_png_file or (2) read_png_file_as_rgb24 function.

EPSS

Процентиль: 79%
0.01223
Низкий

7.5 High

CVSS2