Vulnerability Description
Stack-based buffer overflow in XnView 1.92 and 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long FontName parameter in a slideshow (.sld) file, a different vector than CVE-2008-1461.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pierreegougelet | Xnview | <= 1.92 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/29620PatchVendor Advisory
- http://secunia.com/secunia_research/2008-6/advisory/Vendor Advisory
- http://www.securityfocus.com/bid/28579
- http://www.vupen.com/english/advisories/2008/1044/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41542
- https://www.exploit-db.com/exploits/5346
- http://secunia.com/advisories/29620PatchVendor Advisory
- http://secunia.com/secunia_research/2008-6/advisory/Vendor Advisory
- http://www.securityfocus.com/bid/28579
- http://www.vupen.com/english/advisories/2008/1044/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41542
- https://www.exploit-db.com/exploits/5346
FAQ
What is CVE-2008-0069?
CVE-2008-0069 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Stack-based buffer overflow in XnView 1.92 and 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long FontName parameter in a slideshow (.sld) file, a different vector than ...
How severe is CVE-2008-0069?
CVE-2008-0069 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0069?
Check the references section above for vendor advisories and patch information. Affected products include: Pierreegougelet Xnview.