Multiple buffer overflows in WinImage 8.0.8000 allow user-assisted remote attackers to execute arbitrary code via a FAT image that contains long directory names in a deeply nested directory structure, which triggers (1) a stack-based buffer overflow during extraction, or (2) a heap-based buffer overflow during traversal.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/34359 | vdb entry |
http://www.vupen.com/english/advisories/2007/1854 | vdb entry |
http://secunia.com/advisories/25277 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/24026 | vdb entry |
http://osvdb.org/36082 | vdb entry |
http://vuln.sg/winimage808000-en.html | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34360 | vdb entry |
http://osvdb.org/36081 | vdb entry |