what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 73 of 73 RSS Feed

Files

IrfanView 4.33 TIF Image Decompression Buffer Overflow
Posted Nov 13, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a TIF image decompression buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 72b8882cb0faee2b7373d6e6e4b71c5ed206922b7475df22542144a2d004de0d

Related Files

Secunia Security Advisory 41020
Posted Dec 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - BraniX has discovered some vulnerabilities in the LuraWave PlugIn for IrfanView, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 270ebf9948fb95ba52ef877254835854c06a9640508c7bed091b8aef243ec1e2
Novell Groupwise Internet Agent IMAP LIST Command Remote Code Execution
Posted Nov 10, 2010
Authored by Francis Provencher

Novell Groupwise suffers from an Internet Agent IMAP LIST command remote code execution vulnerability.

tags | exploit, remote, imap, code execution
SHA-256 | de163bf78d636b4473ab7820066e425de60984121a4acf0fdc9a44e1dfda0548
Novell Groupwise Internet Agent IMAP LIST LSUB Command Remote Code Execution
Posted Nov 10, 2010
Authored by Francis Provencher

Novell Groupwise version 8.0.2 suffers from an Internet Agent IMAP LIST LSUB command remote code execution vulnerability.

tags | exploit, remote, imap, code execution
SHA-256 | 443d827567f7a7b163d7618d61e03df800e3c2ed5dc1b2491d7178dcdbd8b7b9
Novell Netware OpenSSH Remote Stack Overflow
Posted Sep 3, 2010
Authored by Francis Provencher

A flaw exists within SSHD.NLM of Novell Netware version 6.5. When the application attempts to resolve an absolute path on the server, a 512 byte destination buffer is used without bounds checking. By providing a large enough value, an attacker can cause a buffer to be overflowed. Successful exploitation results in remote code execution under the context of the server.

tags | exploit, remote, overflow, code execution
SHA-256 | b66ffafeb7f223aee83ce62e71c46bd305a2640628049236529604d8e4bb0ed7
IrfanView PSD RLE Decompression Buffer Overflow
Posted May 14, 2010
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in IrfanView, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error when processing certain RLE compressed PSD images and can be exploited to cause a heap-based buffer overflow by tricking a user into opening a specially crafted PSD file. Successful exploitation may allow execution of arbitrary code. Version 4.25 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-1510
SHA-256 | eb0045d8335d416396d4ea3020455da381eb50f86bb4463506df1c7146b6572d
IrfanView PSD Image Parsing Sign-Extension Vulnerability
Posted May 14, 2010
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in IrfanView, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a sign-extension error when processing certain PSD images, which can be exploited to cause a heap-based buffer overflow by tricking a user into opening a specially crafted PSD file. Successful exploitation may allow execution of arbitrary code. Version 4.25 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-1509
SHA-256 | 0c62dba45771af84679292305942045e3e82e928d385b162cf38c58f700e5354
Secunia Security Advisory 39036
Posted May 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in IrfanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | ca7e9c8386616e543c7e79b7a9a69109a5cb952d7889535d968be5588bbe72f9
Novell Netware 6.5 SP8 Stack Overflow
Posted Mar 30, 2010
Authored by Francis Provencher

Novell Netware version 6.5 SP8 suffers from a FTP related remote stack overflow vulnerability.

tags | advisory, remote, overflow
advisories | CVE-2010-0625
SHA-256 | d70cb64062375e67c59fa55ccdfc4459fc2ba986572b94e42fd9a52b123d90c9
Xerox Workcenter 4150 Buffer Overflow
Posted Jan 31, 2010
Authored by Francis Provencher

The Xerox Workcenter version 4150 suffers from a buffer overflow vulnerability. Proof of concept code included.

tags | exploit, overflow, proof of concept
SHA-256 | 0c47f97159b37b78391874db638835f12d96ef6db7c62a9f90fbaf6511284e7f
Secunia Security Advisory 35359
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tielei Wang has discovered a vulnerability in IrfanView, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | af2c4b283af5d23b7c711876b92fc9a9fd87b235e3651a29219c97be5c0036f6
Secunia - IrfanView Formats Integer Overflow
Posted Apr 7, 2009
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in IrfanView's Formats plug-in version 4.22, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an integer overflow when processing XPM files with certain dimensions. This can be exploited to cause a heap-based buffer overflow by e.g. tricking a user into opening a specially crafted XPM file.

tags | advisory, overflow
advisories | CVE-2009-0197
SHA-256 | 6353310b973c85424bb98e6be658d9995c4aa4e06a23fd615418d3a85048220e
Secunia Security Advisory 34525
Posted Apr 7, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in IrfanView's Formats plug-in, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | e26849bab2f5a50fcf902318a0826e62646d50720e544a3258ecc78be1fa3912
irfanviewiff-overflow.txt
Posted Aug 1, 2008
Authored by fl0 fl0w | Site fl0-fl0w.docspages.com

IrfanView versions 3.99 and below .IFF file local stack buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow, local
SHA-256 | 8c0a11932d465dcab8ff7aa0bf762b6ff88fc5496dfd89402254ea90732bde2c
irfanview-corrupt.txt
Posted Jan 30, 2008
Authored by Marsu

IrfanView version 4.10 .FPX file memory corruption exploit that launches calc.exe.

tags | exploit
SHA-256 | fd482517054c0ff7f8c37b28f526da644268f2b1d0c0a9c0b22aa1f90d8c9676
Secunia Security Advisory 28688
Posted Jan 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsu has discovered a vulnerability in the FlashPix plug-in for IrfanView, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | d03f303ddb57c48671fd15b75b6003068bcd928df30ee16bacaa6b639b2c5a49
Secunia Security Advisory 26619
Posted Oct 16, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in IrfanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | c03eea0a04fede6751143aee0ee194467b66c0e1029ff37eedfcf017c5401d79
secunia-irfanview.txt
Posted Oct 16, 2007
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in IrfanView, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when importing palette files. Versions 3.99 and 4.00 are affected.

tags | advisory
advisories | CVE-2007-4343
SHA-256 | 474b6d103845f885798f337b3763aa6996a3585ba093c8718d1362f60f30a973
irfanview-overflow.txt
Posted May 3, 2007
Authored by Marsu

IrfanView versions 4.00 and below .IFF buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.

tags | exploit, overflow, shell, tcp
SHA-256 | 6dd650ea32e397aafa576e1e2350950671e7fa1936dbf73cabd78835ee545190
Secunia Security Advisory 25052
Posted May 2, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsu has discovered a vulnerability in IrfanView's Formats plug-in, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | edf596732ffd0d135cdf03e1aa861622b010b24984335be60b3f819a60e5f8f0
irfanview399-ani.txt
Posted Apr 10, 2007
Authored by Breno Silva

IrfanView version 3.99 .ANI file local buffer overflow exploit. Comes with multiple targets and binds a shell to TCP port 4444.

tags | exploit, overflow, shell, local, tcp
SHA-256 | 933ce989fe1ceb743c833f979dcbca872ed0f1e5b8806a536e1d47d5d1bb8b3c
Secunia Security Advisory 24725
Posted Apr 5, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Marsu Pilami has discovered a vulnerability in IrfanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 97091e84bd6b3c261d6522b87ea8360ee2257fc881dd07b106a0ddf8496ebd85
irfanview-ani.txt
Posted Apr 2, 2007
Authored by Marsu

IrfanView version 3.99 .ANI file local buffer overflow exploit. Tested against Windows XP SP2 FR. This is not related to the LoadAniIcon stack overflow.

tags | exploit, overflow, local
systems | windows
SHA-256 | 2ddba92aaf3d6072ac14fd8c2d5f9135b0936bce4cd70eb6fb691880eec491ab
prlnx.sh
Posted Jun 26, 2000
Authored by Wojciech Purczynski

Sendmail & procmail & kernel less than 2.2.15 local root exploit.

tags | exploit, kernel, local, root
SHA-256 | 4296222d1bf1930105daa59e2a5114c9af90add47c2081575d64f3a6d4215ae3
Page 3 of 3
Back123Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close