Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, and (6) imagemagick allows remote attackers to execute arbitrary code via the MaxRecordSize header field in a WMF file.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, and (6) imagemagick allows remote attackers to execute arbitrary code via the MaxRecordSize header field in a WMF file.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/archive/1/438803/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10262 | vdb-entry signature x_refsource_OVAL x_transferred |
http://secunia.com/advisories/20921 | third-party-advisory x_refsource_SECUNIA x_transferred |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27516 | vdb-entry x_refsource_XF x_transferred |
http://securitytracker.com/id?1016518 | vdb-entry x_refsource_SECTRACK x_transferred |
http://secunia.com/advisories/21473 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/22311 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.ubuntu.com/usn/usn-333-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
http://securityreason.com/securityalert/1190 | third-party-advisory x_refsource_SREASON x_transferred |
http://secunia.com/advisories/21459 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.securityfocus.com/bid/18751 | vdb-entry x_refsource_BID x_transferred |
http://www.novell.com/linux/security/advisories/2006_19_sr.html | vendor-advisory x_refsource_SUSE x_transferred |
http://secunia.com/advisories/21064 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.vupen.com/english/advisories/2006/2646 | vdb-entry x_refsource_VUPEN x_transferred |
https://www.debian.org/security/2006/dsa-1194 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://secunia.com/advisories/21261 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:132 | vendor-advisory x_refsource_MANDRIVA x_transferred |
http://secunia.com/advisories/21419 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://rhn.redhat.com/errata/RHSA-2006-0597.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://security.gentoo.org/glsa/glsa-200608-17.xml | vendor-advisory x_refsource_GENTOO x_transferred |
Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, and (6) imagemagick allows remote attackers to execute arbitrary code via the MaxRecordSize header field in a WMF file.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.