all things security
Showing 1 - 25 of 29 RSS Feed

Files

XnView 1.98.5 Integer / Heap Overflows
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

XnView versions 1.98.5 and below suffer from an integer overflow and multiple heap overflows. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | 6d5dbe1b14e11651821693877b2e0f5a

Related Files

XnView 2.03 Buffer Overflow
Posted Jul 22, 2013
Authored by Core Security Technologies, Ricardo Narvaja | Site coresecurity.com

Core Security Technologies Advisory - XnView is prone to a security vulnerability when processing PCT files. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine, by enticing the user of XnView to open a specially crafted file.

tags | advisory, remote, arbitrary
advisories | CVE-2013-2577
MD5 | eb96413aa26f5ae0feabd9147fc5396b
Secunia Security Advisory 50825
Posted Oct 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Reaction Information Security has discovered a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 630ea099d33e5e72eff91d62adaa56d1
XnView JLS File Decompression Heap Overflow
Posted Oct 3, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

XnView versions 1.99 and 1.99.1 suffers from a heap-based buffer overflow vulnerability. Proof of concept JLS file included.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2012-4988
MD5 | 5ccedbd692c6872fca8cb9bf45cb5f43
Secunia Security Advisory 50547
Posted Sep 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - FuzzMyApp has reported a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 7e18b7a550cb0c00acbdaf964b415a57
XnView 1.98.8 Heap Overflows
Posted Jun 23, 2012
Authored by Francis Provencher

XnView version 1.98.8 suffers from GIF, PCT, and TIFF image processing heap overflow vulnerabilities. Proof of concepts included.

tags | exploit, overflow, vulnerability, proof of concept
systems | linux
MD5 | 38d379d4410dd76995d2a4ca2056d28d
Secunia Security Advisory 48666
Posted Jun 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered multiple vulnerabilities in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 9bffcd75486230534bcd7e32fc902e80
Secunia Security Advisory 49091
Posted Jun 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered multiple vulnerabilities in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 5ba1788ac3ee6a78523ee245953efda8
XnView FlashPix Image Processing Heap Overflow
Posted Mar 13, 2012
Authored by Francis Provencher

XnView FlashPix suffers from an image processing heap overflow vulnerability. Proof of concept file included.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | 6c8f6c943593f4dd0f702ecf84e1351b
Secunia Security Advisory 47388
Posted Mar 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 03f17e251932ced0404690f5c9e138fd
Secunia Security Advisory 47352
Posted Feb 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 19f58675a11d2e5c4c10366e51e0e003
Secunia Security Advisory 47600
Posted Jan 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 1e7ab3eaebc6fb2848b4d0b6f9dd6196
Secunia Security Advisory 45127
Posted Jul 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | f6448c8c997b02354835c3c93741c3d8
XnView 1.98 Denial Of Service Proof Of Concept
Posted Jun 20, 2011
Authored by BraniX

XnView version 1.98 proof of concept denial of service exploit.

tags | exploit, denial of service, proof of concept
MD5 | 871bd007765bd0a613b4a01fac5e3ae0
Secunia Security Advisory 40141
Posted Jun 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mauro Olea has discovered a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 57faffbe8c33d6b6408792f5086d76d7
Core Security Technologies Advisory 2010.0514
Posted Jun 16, 2010
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - XnView is prone to a security vulnerability when processing MBM files. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine, by enticing the user of XnView to open a specially crafted file.

tags | advisory, remote, arbitrary
advisories | CVE-2010-1932
MD5 | 52a2321f4ec7f08bc9d8c54a960a09bc
XnView DICOM Parsing Integer Overflow
Posted Mar 11, 2010
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in XnView, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an integer overflow when processing DICOM images with certain dimensions. This can be exploited to cause a heap-based buffer overflow by e.g. tricking a user into opening a specially crafted DICOM file. Version 1.97 is affected.

tags | advisory, overflow
advisories | CVE-2009-4001
MD5 | 06aae772fe010c07ca5d04fd20ac13e2
Secunia Security Advisory 37673
Posted Mar 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in XnView, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | db51e1156962c72ace396f0f340831bf
Secunia Security Advisory 30416
Posted Jun 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 41ee3f6dff0ccb575a28c784e4459b6f
secunia-xnview.txt
Posted Jun 20, 2008
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in XnView, NConvert, and GFL SDK, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when processing the "format" keyword of Sun TAAC files. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into viewing a specially crafted Sun TAAC file. Successful exploitation allows execution of arbitrary code. The vulnerability is confirmed in version 1.70 of XnView for Linux and FreeBSD, XnView 1.93.6 for Windows, GFL SDK 2.82, and NConvert 4.92. Other versions may also be affected.

tags | advisory, overflow, arbitrary
systems | linux, windows, freebsd
advisories | CVE-2008-2427
MD5 | 6ba5dab433145e97d4ce1081b424ee5e
xnview1921-overflow.txt
Posted Apr 3, 2008
Authored by haluznik

XnView version 1.92.1 Slideshow "FontName" buffer overflow exploit.

tags | exploit, overflow
MD5 | 3cb227e79fab39b3043c5a7cbf2cdd58
Secunia Security Advisory 29620
Posted Mar 31, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 694ba257c2984f8a8161495e6b478d0f
xnview-overflow.txt
Posted Mar 17, 2008
Authored by Sylvain THUAL | Site click-internet.fr

XNview version 1.92.1 suffers from a long filename overflow vulnerability.

tags | exploit, overflow
MD5 | 7cf2a77bff81425aa7552b424c19c07a
Secunia Security Advisory 28326
Posted Jan 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in XnView and NConvert, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | bb618385accba904774e431d68185e44
Secunia Security Advisory 26006
Posted Jul 13, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has acknowledged a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, gentoo
MD5 | 6106a2c1811c5d1a9f1eddac2ed93002
Gentoo Linux Security Advisory 200707-6
Posted Jul 12, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200707-06 - XnView is vulnerable to a stack-based buffer overflow while processing an XPM file with an overly long section string (greater than 1024 bytes). Versions less than 1.70 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2007-2194
MD5 | 5f162b42e05cbaae3228336635705b67
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close