imlib2 before 1.4.2 allows context-dependent attackers to have an unspecified impact via a crafted (1) ARGB, (2) BMP, (3) JPEG, (4) LBM, (5) PNM, (6) TGA, or (7) XPM file, related to "several heap and stack based buffer overflows - partly due to integer overflows."
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T11:20:24.663Z
Reserved: 2009-02-05T00:00:00
Link: CVE-2008-6079

No data.

Status : Modified
Published: 2009-02-06T11:30:00.360
Modified: 2024-11-21T00:55:37.000
Link: CVE-2008-6079
