Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sam2p
(Sam2p_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 18 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2018-02-26 | CVE-2018-7487 | There is a heap-based buffer overflow in the LoadPCX function of in_pcx.cpp in sam2p 0.49.4. A Crafted input will lead to a denial of service or possibly unspecified other impact. | Debian_linux, Sam2p | 7.8 | ||
2017-11-08 | CVE-2017-16663 | In sam2p 0.49.4, there are integer overflows (with resultant heap-based buffer overflows) in input-bmp.ci in the function ReadImage, because "width * height" multiplications occur unsafely. | Sam2p | 5.5 | ||
2017-09-22 | CVE-2017-14637 | In sam2p 0.49.3, there is an invalid read of size 2 in the parse_rgb function in in_xpm.cpp. However, this can also cause a write to an illegal address. | Sam2p | 9.8 | ||
2017-09-22 | CVE-2017-14636 | Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element. | Sam2p | 9.8 | ||
2017-09-21 | CVE-2017-14631 | In sam2p 0.49.3, the pcxLoadRaster function in in_pcx.cpp has an integer signedness error leading to a heap-based buffer overflow. | Sam2p | 9.8 | ||
2017-09-21 | CVE-2017-14630 | In sam2p 0.49.3, an integer overflow exists in the pcxLoadImage24 function of the file in_pcx.cpp, leading to an invalid write operation. | Sam2p | 9.8 | ||
2017-09-21 | CVE-2017-14629 | In sam2p 0.49.3, the in_xpm_reader function in in_xpm.cpp has an integer signedness error, leading to a crash when writing to an out-of-bounds array element. | Sam2p | 7.5 | ||
2017-09-21 | CVE-2017-14628 | In sam2p 0.49.3, a heap-based buffer overflow exists in the pcxLoadImage24 function of the file in_pcx.cpp. | Sam2p | 9.8 |