Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/show/osvdb/85893 - | |
References | () http://seclists.org/fulldisclosure/2012/Oct/36 - | |
References | () http://secunia.com/advisories/50825 - | |
References | () http://www.reactionpenetrationtesting.co.uk/xnview-jls-heap.html - | |
References | () http://www.securityfocus.com/bid/55787 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/79030 - | |
References | () https://www.exploit-db.com/exploits/21741/ - |
Information
Published : 2014-07-09 14:55
Updated : 2025-04-12 10:46
NVD link : CVE-2012-4988
Mitre link : CVE-2012-4988
CVE.ORG link : CVE-2012-4988
JSON object : View
Products Affected
xnview
- xnview
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer