CVE-2009-4001
15.03.2010, 13:28
Integer overflow in XnView before 1.97.2 might allow remote attackers to execute arbitrary code via a DICOM image with crafted dimensions, leading to a heap-based buffer overflow.Enginsight
Vendor | Product | Version |
---|---|---|
xnview | xnview | 𝑥 ≤ 1.97.1 |
xnview | xnview | 1.0:a |
xnview | xnview | 1.01 |
xnview | xnview | 1.02 |
xnview | xnview | 1.03 |
xnview | xnview | 1.04 |
xnview | xnview | 1.05 |
xnview | xnview | 1.05:b |
xnview | xnview | 1.05:c |
xnview | xnview | 1.06 |
xnview | xnview | 1.07 |
xnview | xnview | 1.08 |
xnview | xnview | 1.09 |
xnview | xnview | 1.10 |
xnview | xnview | 1.11 |
xnview | xnview | 1.12 |
xnview | xnview | 1.13 |
xnview | xnview | 1.14 |
xnview | xnview | 1.15 |
xnview | xnview | 1.16 |
xnview | xnview | 1.17 |
xnview | xnview | 1.17:a |
xnview | xnview | 1.18 |
xnview | xnview | 1.18.1 |
xnview | xnview | 1.19 |
xnview | xnview | 1.20 |
xnview | xnview | 1.21 |
xnview | xnview | 1.22 |
xnview | xnview | 1.23 |
xnview | xnview | 1.24 |
xnview | xnview | 1.25 |
xnview | xnview | 1.25:a |
xnview | xnview | 1.30 |
xnview | xnview | 1.31 |
xnview | xnview | 1.32 |
xnview | xnview | 1.33 |
xnview | xnview | 1.34 |
xnview | xnview | 1.35 |
xnview | xnview | 1.36 |
xnview | xnview | 1.37 |
xnview | xnview | 1.40 |
xnview | xnview | 1.41 |
xnview | xnview | 1.45 |
xnview | xnview | 1.46 |
xnview | xnview | 1.50 |
xnview | xnview | 1.50.1 |
xnview | xnview | 1.55 |
xnview | xnview | 1.60 |
xnview | xnview | 1.61 |
xnview | xnview | 1.65 |
xnview | xnview | 1.66 |
xnview | xnview | 1.67 |
xnview | xnview | 1.68 |
xnview | xnview | 1.68.1 |
xnview | xnview | 1.70 |
xnview | xnview | 1.70.2 |
xnview | xnview | 1.70.3 |
xnview | xnview | 1.70.4 |
xnview | xnview | 1.74 |
xnview | xnview | 1.80 |
xnview | xnview | 1.80.1 |
xnview | xnview | 1.80.2 |
xnview | xnview | 1.80.3 |
xnview | xnview | 1.82 |
xnview | xnview | 1.82.2 |
xnview | xnview | 1.82.3 |
xnview | xnview | 1.82.4 |
xnview | xnview | 1.90 |
xnview | xnview | 1.90.1 |
xnview | xnview | 1.90.3 |
xnview | xnview | 1.91 |
xnview | xnview | 1.91.1 |
xnview | xnview | 1.91.2 |
xnview | xnview | 1.91.3 |
xnview | xnview | 1.91.4 |
xnview | xnview | 1.91.5 |
xnview | xnview | 1.91.6 |
xnview | xnview | 1.92 |
xnview | xnview | 1.92.1 |
xnview | xnview | 1.93 |
xnview | xnview | 1.93.1 |
xnview | xnview | 1.93.2 |
xnview | xnview | 1.93.3 |
xnview | xnview | 1.93.4 |
xnview | xnview | 1.93.6 |
xnview | xnview | 1.94 |
xnview | xnview | 1.94.1 |
xnview | xnview | 1.94.2 |
xnview | xnview | 1.95 |
xnview | xnview | 1.95.1 |
xnview | xnview | 1.95.2 |
xnview | xnview | 1.95.3 |
xnview | xnview | 1.95.4 |
xnview | xnview | 1.96 |
xnview | xnview | 1.96.1 |
xnview | xnview | 1.96.2 |
xnview | xnview | 1.96.5 |
xnview | xnview | 1.97 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References