ID

VAR-201005-0334


CVE

CVE-2010-1513


TITLE

Ziproxy of src/image.c Integer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-003992

DESCRIPTION

Multiple integer overflows in src/image.c in Ziproxy before 3.0.1 allow remote attackers to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer overflows. Ziproxy is a forwarded, non-cached, compressed HTTP proxy server. Ziproxy can compress images into low quality JPEG files or JPEG 2000 and compress (gzip or) HTML and other text-like data. Ziproxy has an integer overflow, and a remote attacker can exploit the vulnerability to execute arbitrary instructions with application privileges. Ziproxy is prone to multiple integer-overflow vulnerabilities because it fails to properly validate user-supplied data. Failed exploit attempts will likely result in denial-of-service conditions. Ziproxy 3.0 is vulnerable; other versions may also be affected. ====================================================================== Secunia Research 24/05/2010 - Ziproxy Two Integer Overflow Vulnerabilities - ====================================================================== Table of Contents Affected Software....................................................1 Severity.............................................................2 Vendor's Description of Software.....................................3 Description of Vulnerability.........................................4 Solution.............................................................5 Time Table...........................................................6 Credits..............................................................7 References...........................................................8 About Secunia........................................................9 Verification........................................................10 ====================================================================== 1) Affected Software * Ziproxy 3.0.0 NOTE: Other versions may also be affected. ====================================================================== 2) Severity Rating: Highly critical Impact: System access Where: Remote ====================================================================== 3) Vendor's Description of Software "Ziproxy is forwarding, non-caching, compressing HTTP proxy server. Product Link: http://ziproxy.sourceforge.net/ ====================================================================== 4) Description of Vulnerability Secunia Research has discovered two vulnerabilities in Ziproxy, which can be exploited by malicious people to compromise a vulnerable system. ====================================================================== 5) Solution Update to version 3.0.1. ====================================================================== 6) Time Table 19/05/2010 - Vendor notified. 19/05/2010 - Vendor response. 20/05/2010 - Vendor issues fixed version. 24/05/2010 - Public disclosure. ====================================================================== 7) Credits Discovered by Stefan Cornelius, Secunia Research. ====================================================================== 8) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2010-1513 for the vulnerabilities. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://secunia.com/advisories/business_solutions/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/advisories/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://secunia.com/secunia_research/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/corporate/jobs/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/advisories/mailing_lists/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2010-75/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ====================================================================== _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ---------------------------------------------------------------------- Stay Compliant Alerts, Technical Descriptions, PoC, Links to patches, CVSS, CVE, Changelogs, Alternative Remediation Strategies, and much more provided in the Secunia Vulnerability Intelligence solutions Free Trial http://secunia.com/products/corporate/evm/trial/ ---------------------------------------------------------------------- TITLE: Ziproxy Two Integer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA39941 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/39941/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=39941 RELEASE DATE: 2010-05-25 DISCUSS ADVISORY: http://secunia.com/advisories/39941/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/39941/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=39941 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Secunia Research has discovered some vulnerabilities in Ziproxy, which can be exploited by malicious people to compromise a vulnerable system. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2010-75/ OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2010-1513 // JVNDB: JVNDB-2010-003992 // CNVD: CNVD-2010-0949 // BID: 40344 // PACKETSTORM: 89897 // PACKETSTORM: 89849

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-0949

AFFECTED PRODUCTS

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:3.0.1

Trust: 1.6

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.4.8

Trust: 1.6

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.7.9

Trust: 1.6

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.6.9

Trust: 1.6

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.3.5

Trust: 1.6

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.5.9

Trust: 1.6

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:1.1

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.5.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.1.1

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.5.1

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:1.4.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:1.5.2

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.4.2

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.0.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.4.3

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.7.1

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.4.1

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:1.9.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.4.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.2.1

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.3.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:1.3

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.2.2

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.2.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:lteversion:3.0.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.5.2

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.7.2

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:1.5.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:1.5.1

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:1.2

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.6.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.7.0

Trust: 1.0

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:2.1.0

Trust: 1.0

vendor:ziproxymodel:ziproxyscope:eqversion:3.0

Trust: 0.9

vendor:daniel mealha cabritamodel:ziproxyscope:ltversion:3.0.1

Trust: 0.8

vendor:ziproxymodel:ziproxyscope:neversion:3.0.1

Trust: 0.3

sources: CNVD: CNVD-2010-0949 // BID: 40344 // JVNDB: JVNDB-2010-003992 // CNNVD: CNNVD-201005-367 // NVD: CVE-2010-1513

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1513
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-1513
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201005-367
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2010-1513
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2010-003992 // CNNVD: CNNVD-201005-367 // NVD: CVE-2010-1513

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.8

sources: JVNDB: JVNDB-2010-003992 // NVD: CVE-2010-1513

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201005-367

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201005-367

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-003992

PATCH

title:Top Pageurl:http://ziproxy.sourceforge.net/

Trust: 0.8

title:Ziproxy image parsing integer overflow patchurl:https://www.cnvd.org.cn/patchInfo/show/382

Trust: 0.6

sources: CNVD: CNVD-2010-0949 // JVNDB: JVNDB-2010-003992

EXTERNAL IDS

db:NVDid:CVE-2010-1513

Trust: 3.4

db:SECUNIAid:39941

Trust: 1.7

db:JVNDBid:JVNDB-2010-003992

Trust: 0.8

db:CNVDid:CNVD-2010-0949

Trust: 0.6

db:NSFOCUSid:15096

Trust: 0.6

db:CNNVDid:CNNVD-201005-367

Trust: 0.6

db:BIDid:40344

Trust: 0.3

db:PACKETSTORMid:89897

Trust: 0.1

db:PACKETSTORMid:89849

Trust: 0.1

sources: CNVD: CNVD-2010-0949 // BID: 40344 // JVNDB: JVNDB-2010-003992 // PACKETSTORM: 89897 // PACKETSTORM: 89849 // CNNVD: CNNVD-201005-367 // NVD: CVE-2010-1513

REFERENCES

url:http://secunia.com/secunia_research/2010-75/

Trust: 2.7

url:http://ziproxy.sourceforge.net/#news

Trust: 1.6

url:http://secunia.com/advisories/39941

Trust: 1.6

url:http://www.securityfocus.com/archive/1/511424/100/0/threaded

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1513

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1513

Trust: 0.8

url:http://www.nsfocus.net/vulndb/15096

Trust: 0.6

url:http://ziproxy.sourceforge.net/

Trust: 0.4

url:http://secunia.com/secunia_research/

Trust: 0.1

url:http://secunia.com/corporate/jobs/

Trust: 0.1

url:http://secunia.com/advisories/mailing_lists/

Trust: 0.1

url:http://secunia.com/advisories/

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1513

Trust: 0.1

url:http://secunia.com/advisories/39941/

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/products/corporate/evm/trial/

Trust: 0.1

url:http://secunia.com/advisories/39941/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=39941

Trust: 0.1

sources: CNVD: CNVD-2010-0949 // BID: 40344 // JVNDB: JVNDB-2010-003992 // PACKETSTORM: 89897 // PACKETSTORM: 89849 // CNNVD: CNNVD-201005-367 // NVD: CVE-2010-1513

CREDITS

Stefan Cornelius

Trust: 1.0

sources: BID: 40344 // PACKETSTORM: 89897 // CNNVD: CNNVD-201005-367

SOURCES

db:CNVDid:CNVD-2010-0949
db:BIDid:40344
db:JVNDBid:JVNDB-2010-003992
db:PACKETSTORMid:89897
db:PACKETSTORMid:89849
db:CNNVDid:CNNVD-201005-367
db:NVDid:CVE-2010-1513

LAST UPDATE DATE

2025-04-11T23:10:08.626000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-0949date:2010-05-25T00:00:00
db:BIDid:40344date:2010-05-24T00:00:00
db:JVNDBid:JVNDB-2010-003992date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-201005-367date:2010-05-28T00:00:00
db:NVDid:CVE-2010-1513date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-0949date:2010-05-25T00:00:00
db:BIDid:40344date:2010-05-24T00:00:00
db:JVNDBid:JVNDB-2010-003992date:2012-06-26T00:00:00
db:PACKETSTORMid:89897date:2010-05-25T05:25:56
db:PACKETSTORMid:89849date:2010-05-24T07:14:00
db:CNNVDid:CNNVD-201005-367date:2010-05-28T00:00:00
db:NVDid:CVE-2010-1513date:2010-05-26T19:30:01.343