CVE-2010-1513
Published: 26 May 2010
Multiple integer overflows in src/image.c in Ziproxy before 3.0.1 allow remote attackers to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer overflows.
Priority
Status
Package | Release | Status |
---|---|---|
ziproxy Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Does not exist
|
|
jaunty |
Ignored
(end of life)
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Not vulnerable
(3.1.3-1)
|
|
oneiric |
Not vulnerable
(3.1.3-1)
|
|
precise |
Not vulnerable
(3.1.3-1)
|
|
quantal |
Not vulnerable
(3.1.3-1)
|
|
raring |
Not vulnerable
(3.1.3-1)
|
|
saucy |
Not vulnerable
(3.1.3-1)
|
|
upstream |
Released
(3.0.1)
|