ALT-PU-2017-2327-1
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-0848
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160668.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168507.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165547.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/01/2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/74923
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://security.gentoo.org/glsa/201602-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160668.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168507.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165547.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/01/2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/74923
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://security.gentoo.org/glsa/201602-03
Modified: 2025-04-12
CVE-2015-4588
Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160668.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/03/6
- http://www.openwall.com/lists/oss-security/2015/06/16/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75230
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1227243
- https://security.gentoo.org/glsa/201602-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160668.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/03/6
- http://www.openwall.com/lists/oss-security/2015/06/16/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75230
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1227243
- https://security.gentoo.org/glsa/201602-03
Modified: 2025-04-12
CVE-2015-4695
meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162569.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/17/3
- http://www.openwall.com/lists/oss-security/2015/06/21/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75329
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
- https://security.gentoo.org/glsa/201602-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162569.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/17/3
- http://www.openwall.com/lists/oss-security/2015/06/21/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75329
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
- https://security.gentoo.org/glsa/201602-03
Modified: 2025-04-12
CVE-2015-4696
Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162569.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/17/3
- http://www.openwall.com/lists/oss-security/2015/06/21/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75331
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
- https://security.gentoo.org/glsa/201602-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162569.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/17/3
- http://www.openwall.com/lists/oss-security/2015/06/21/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75331
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
- https://security.gentoo.org/glsa/201602-03
Modified: 2025-04-20
CVE-2016-9011
The wmf_malloc function in api.c in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (application crash) via a crafted wmf file, which triggers a memory allocation failure.
- http://www.openwall.com/lists/oss-security/2016/10/25/1
- http://www.securityfocus.com/bid/93860
- https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c
- https://bugzilla.redhat.com/show_bug.cgi?id=1388450
- http://www.openwall.com/lists/oss-security/2016/10/25/1
- http://www.securityfocus.com/bid/93860
- https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c
- https://bugzilla.redhat.com/show_bug.cgi?id=1388450