Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.800927
Categoría:Buffer overflow
Título:XEmacs Multiple Buffer Overflow Vulnerabilities - Windows
Resumen:XEmacs is prone to multiple Buffer Overflow vulnerabilities.
Descripción:Summary:
XEmacs is prone to multiple Buffer Overflow vulnerabilities.

Vulnerability Insight:
Error exists when 'tiff_instantiate' function processing a
crafted TIFF file, 'png_instantiate' function processing a crafted PNG file,
'jpeg_instantiate' function processing a crafted JPEG file in the
glyphs-eimage.c script that can be exploited to cause a heap-based buffer
overflow.

Vulnerability Impact:
Attackers can exploit this issue to execute arbitrary code in the
context of affected application, and can cause denial of service.

Affected Software/OS:
XEmacs version 21.4.22 and prior on Windows.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-2688
BugTraq ID: 35473
http://www.securityfocus.com/bid/35473
http://tracker.xemacs.org/XEmacs/its/issue534
http://osvdb.org/55298
http://secunia.com/advisories/35348
http://www.vupen.com/english/advisories/2009/1666
XForce ISS Database: xemacs-jpeg-bo(51334)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51334
XForce ISS Database: xemacs-png-bo(51333)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51333
XForce ISS Database: xemacs-tiff-bo(51332)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51332
CopyrightCopyright (C) 2009 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.