FKIE_CVE-2010-1513
Vulnerability from fkie_nvd - Published: 2010-05-26 19:30 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple integer overflows in src/image.c in Ziproxy before 3.0.1 allow remote attackers to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer overflows.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18FD3149-F36E-4BF7-8C21-0CDB2FE4B560",
"versionEndIncluding": "3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C5B6A01-6AC3-4141-8EF6-B23D1505F127",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7D01E68D-F383-4BA8-BEAE-1F681EC356DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.2:b:*:*:*:*:*:*",
"matchCriteriaId": "C2A964CF-169D-456C-8C1A-FB00FA7437F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C6D89A-1B5C-4A9B-8D09-604BB8909811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.3:b:*:*:*:*:*:*",
"matchCriteriaId": "7B616A9F-887B-4E7B-B7E3-D0BEDEC3FD67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "7EE4225F-3EFE-4A5D-98F1-FCC5698E0FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.3:c:*:*:*:*:*:*",
"matchCriteriaId": "440925BE-9205-4E2C-B3BC-509BDF7EAB80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.3:d:*:*:*:*:*:*",
"matchCriteriaId": "A03D7774-7B65-4568-A151-527DC738A642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "763D61D0-C7A7-4929-8468-70C33558E60B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "174A66FC-2E21-410A-98C0-EECAD3E89386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D107B490-E55C-463B-BDA2-75932E943788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7D2AAB-23FF-4B6D-84B5-741FC12D7B1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "542157AC-A1ED-47A0-836F-6948E6C82379",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6F6B8DF-E9D1-4990-B47A-4AC69DA84C19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0DC2AE-D024-4DF0-BC87-55F4F085E49F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8143516E-36A3-4DF2-8FDC-4DC04F602385",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1B50F73E-A226-4D5B-94E8-6A9565B5DE92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D009E90D-3355-4F16-BD3B-6E1FF358FEB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "00C08D9C-F481-41F7-8C37-80363A1771AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C4FA1A2C-3648-4427-B015-761CD41DEFDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.3.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "96D06C9C-03EA-409D-836C-38C2D2E19A04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E92D7B74-4292-4F6C-ABBC-C83FB115F737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "16481D40-9A7F-4602-BD4A-FA3AB3C86464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "76C79BBC-4F9C-4659-9C33-792FD0CA6027",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ED91CFBF-98D5-406C-8749-7A44F564FD4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.4.8:beta:*:*:*:*:*:*",
"matchCriteriaId": "046DB462-76FC-4E90-9292-9CD8BB889394",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.4.8:beta2:*:*:*:*:*:*",
"matchCriteriaId": "0064D7F3-6518-4922-9C0C-88B9CE98153B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FDBE77F-2E5E-432B-A4A0-20C913E794B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296C55FB-D2BB-4BD9-9553-739D9D3986E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0EFF4BE-BC8F-4F38-B4B6-534EE065D456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.5.9:beta:*:*:*:*:*:*",
"matchCriteriaId": "B293A885-20EF-4299-BF9B-F02FC974614A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9AF7CC12-985A-47E7-BBFA-8CC054BBA007",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.6.9:beta:*:*:*:*:*:*",
"matchCriteriaId": "26BC1984-AC0B-4747-B090-410AE0341CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.6.9:beta2:*:*:*:*:*:*",
"matchCriteriaId": "97404EAA-A99C-43C4-A390-B558BA172C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F76232-630C-4B78-99A6-A8004601CF32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE355E9-72B4-45D2-8D1C-D303650AC654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C00244E-24FE-4D47-B815-D9156CD10DB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.7.9:beta:*:*:*:*:*:*",
"matchCriteriaId": "749E734E-E44F-4AF2-BBB0-0D3939136417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.7.9:beta2:*:*:*:*:*:*",
"matchCriteriaId": "F87D0787-A290-40C6-83C8-1831EAB74074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:2.7.9:beta3:*:*:*:*:*:*",
"matchCriteriaId": "75E4CB09-B594-4175-B39F-3367C1A64251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:daniel_mealha_cabrita:ziproxy:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB95E4ED-1007-4386-BACD-9F2DB4208507",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple integer overflows in src/image.c in Ziproxy before 3.0.1 allow remote attackers to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer overflows."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de enteros en src/image.c in Ziproxy before v3.0.1 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s (1) una imagen JPG, relacionada con funci\u00f3n jpg2bitmap o (2) una imagen PNG image, lo que provoca un desbordamiento de b\u00fafer basado en mont\u00edculo."
}
],
"id": "CVE-2010-1513",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2010-05-26T19:30:01.343",
"references": [
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/39941"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2010-75/"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.securityfocus.com/archive/1/511424/100/0/threaded"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Vendor Advisory"
],
"url": "http://ziproxy.sourceforge.net/#news"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/39941"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2010-75/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/511424/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://ziproxy.sourceforge.net/#news"
}
],
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…