Vulnerabilities > CVE-2012-0025 - Resource Management Errors vulnerability in Irfanview Flashpix Plugin 4.2.2.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Double free vulnerability in the Free_All_Memory function in jpeg/dectile.c in libfpx before 1.3.1-1, as used in the FlashPix PlugIn 4.2.2.0 for IrfanView, allows remote attackers to cause a denial of service (crash) via a crafted FPX image.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | IrfanView FlashPix PlugIn Double-Free Vulnerability. CVE-2011-5232,CVE-2012-0025. Dos exploit for windows platform |
file | exploits/windows/dos/18256.txt |
id | EDB-ID:18256 |
last seen | 2016-02-02 |
modified | 2011-12-20 |
platform | windows |
port | |
published | 2011-12-20 |
reporter | Francis Provencher |
source | https://www.exploit-db.com/download/18256/ |
title | IrfanView FlashPix PlugIn Double-Free Vulnerability |
type | dos |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-201605-03.NASL |
description | The remote host is affected by the vulnerability described in GLSA-201605-03 (libfpx: Denial of Service) A double free vulnerability has been discovered in the Free_All_Memory function in jpeg/dectile.c. Impact : A remote attacker could entice a user to open a specially crafted FPX image using an application linked against libfpx, possibly resulting in a Denial of Service condition. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 91376 |
published | 2016-05-31 |
reporter | This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/91376 |
title | GLSA-201605-03 : libfpx: Denial of Service |
code |
|
References
- http://secunia.com/advisories/47246
- http://secunia.com/advisories/47322
- http://www.exploit-db.com/exploits/18256
- http://www.imagemagick.org/download/delegates/libfpx-1.3.1-1.zip
- http://www.openwall.com/lists/oss-security/2012/01/03/16
- http://www.openwall.com/lists/oss-security/2012/11/02/6
- http://www.osvdb.org/77958
- http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=31&Itemid=31
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71892
- https://security.gentoo.org/glsa/201605-03
- http://secunia.com/advisories/47246
- https://security.gentoo.org/glsa/201605-03
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71892
- http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=31&Itemid=31
- http://www.osvdb.org/77958
- http://www.openwall.com/lists/oss-security/2012/11/02/6
- http://www.openwall.com/lists/oss-security/2012/01/03/16
- http://www.imagemagick.org/download/delegates/libfpx-1.3.1-1.zip
- http://www.exploit-db.com/exploits/18256
- http://secunia.com/advisories/47322