DescriptionMultiple integer overflows in src/image.c in Ziproxy before 3.0.1 allow remote attackers to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer overflows.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs584933

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ziproxy (PTS)jessie3.2.0-2fixed
bullseye, sid, buster, stretch3.3.1-2.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[lenny] - ziproxy <no-dsa> (Minor issue, obscure attack vector)

Search for package or bug name: Reporting problems