CVE-2010-1513

NameCVE-2010-1513
DescriptionMultiple integer overflows in src/image.c in Ziproxy before 3.0.1 allow remote attackers to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer overflows.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs584933

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ziproxy (PTS)buster3.3.1-2.1fixed
bullseye3.3.1-2.2fixed
bookworm3.3.2-6fixed
sid, trixie3.3.2-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ziproxysource(unstable)3.1.0-1584933

Notes

[lenny] - ziproxy <no-dsa> (Minor issue, obscure attack vector)

Search for package or bug name: Reporting problems