First published: Wed Dec 15 2004(Updated: )
Multiple integer overflows in xzgv 0.8 and earlier allow remote attackers to execute arbitrary code via images with large width and height values, which trigger a heap-based buffer overflow, as demonstrated in the read_prf_file function in readprf.c. NOTE: CVE-2004-0994 and CVE-2004-1095 identify sets of bugs that only partially overlap, despite having the same developer. Therefore, they should be regarded as distinct.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
zgv | =0.8 | |
zgv | =0.6 | |
zgv image viewer | =5.5 | |
zgv image viewer | =5.8 | |
zgv image viewer | =5.7 | |
zgv | =0.7 | |
zgv image viewer | =5.6 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-0994 is typically rated as high due to the potential for remote code execution.
To fix CVE-2004-0994, upgrade to a secure version of xzgv that addresses the integer overflow vulnerabilities.
CVE-2004-0994 affects xzgv versions 0.6, 0.7, 0.8 and zgv versions 5.5 to 5.8.
CVE-2004-0994 represents an integer overflow vulnerability that can lead to a heap-based buffer overflow.
Yes, CVE-2004-0994 can be exploited remotely through specially crafted image files with large dimensions.