ID

VAR-201006-0352


CVE

CVE-2010-2350


TITLE

Ziproxy of PNG Heap-based buffer overflow vulnerability in decoder

Trust: 0.8

sources: JVNDB: JVNDB-2010-004158

DESCRIPTION

Heap-based buffer overflow in the PNG decoder in Ziproxy 3.1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNG file. Ziproxy is a forwarded, non-cached, compressed HTTP proxy server. Ziproxy can compress images into low quality JPEG files or JPEG 2000 and compress (gzip or) HTML and other text-like data. Ziproxy handles partial PNG images with errors that trick users into loading specially constructed PNG images with Ziproxy, which can trigger heap-based buffer overflows. Ziproxy is prone to a denial-of-service vulnerability. ---------------------------------------------------------------------- Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management Free webinars http://secunia.com/vulnerability_scanning/corporate/webinars/ ---------------------------------------------------------------------- TITLE: Ziproxy PNG Image Processing Vulnerability SECUNIA ADVISORY ID: SA40156 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40156/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40156 RELEASE DATE: 2010-06-26 DISCUSS ADVISORY: http://secunia.com/advisories/40156/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40156/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40156 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Ziproxy, which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is reported in version 3.1.0. SOLUTION: Update to version 3.1.1. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://ziproxy.sourceforge.net/ http://ziproxy.cvs.sourceforge.net/viewvc/ziproxy/ziproxy-default/ChangeLog?r1=1.241&r2=1.239 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2010-2350 // JVNDB: JVNDB-2010-004158 // CNVD: CNVD-2010-1125 // BID: 78881 // VULMON: CVE-2010-2350 // PACKETSTORM: 91078

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-1125

AFFECTED PRODUCTS

vendor:daniel mealha cabritamodel:ziproxyscope:eqversion:3.1.0

Trust: 2.4

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:danielmodel:mealha cabrita ziproxyscope:eqversion:3.1

Trust: 0.3

sources: CNVD: CNVD-2010-1125 // BID: 78881 // JVNDB: JVNDB-2010-004158 // CNNVD: CNNVD-201006-347 // NVD: CVE-2010-2350

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2350
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-2350
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201006-347
value: MEDIUM

Trust: 0.6

VULMON: CVE-2010-2350
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-2350
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2010-2350 // JVNDB: JVNDB-2010-004158 // CNNVD: CNNVD-201006-347 // NVD: CVE-2010-2350

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2010-004158 // NVD: CVE-2010-2350

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201006-347

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201006-347

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-004158

PATCH

title:Top Pageurl:http://ziproxy.sourceforge.net/

Trust: 0.8

title:Ziproxy PNG image processing patchurl:https://www.cnvd.org.cn/patchInfo/show/487

Trust: 0.6

title:Debian CVElist Bug Report Logs: ziproxy: CVE-2010-2350url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=abf37843331f4157de77764f3ae5ea03

Trust: 0.1

sources: CNVD: CNVD-2010-1125 // VULMON: CVE-2010-2350 // JVNDB: JVNDB-2010-004158

EXTERNAL IDS

db:NVDid:CVE-2010-2350

Trust: 3.4

db:SECUNIAid:40156

Trust: 2.4

db:VUPENid:ADV-2010-1501

Trust: 1.6

db:XFid:59510

Trust: 0.9

db:JVNDBid:JVNDB-2010-004158

Trust: 0.8

db:CNVDid:CNVD-2010-1125

Trust: 0.6

db:CNNVDid:CNNVD-201006-347

Trust: 0.6

db:BIDid:78881

Trust: 0.4

db:VUPENid:2010/1501

Trust: 0.1

db:VULMONid:CVE-2010-2350

Trust: 0.1

db:PACKETSTORMid:91078

Trust: 0.1

sources: CNVD: CNVD-2010-1125 // VULMON: CVE-2010-2350 // BID: 78881 // JVNDB: JVNDB-2010-004158 // PACKETSTORM: 91078 // CNNVD: CNNVD-201006-347 // NVD: CVE-2010-2350

REFERENCES

url:http://ziproxy.cvs.sourceforge.net/viewvc/ziproxy/ziproxy-default/changelog?revision=1.240&view=markup

Trust: 2.0

url:http://www.vupen.com/english/advisories/2010/1501

Trust: 1.7

url:http://secunia.com/advisories/40156

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/59510

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/59510

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2350

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2350

Trust: 0.8

url:http://secunia.com/advisories/40156/

Trust: 0.7

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=587039

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/78881

Trust: 0.1

url:http://ziproxy.sourceforge.net/

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/40156/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40156

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/webinars/

Trust: 0.1

url:http://ziproxy.cvs.sourceforge.net/viewvc/ziproxy/ziproxy-default/changelog?r1=1.241&r2=1.239

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2010-1125 // VULMON: CVE-2010-2350 // BID: 78881 // JVNDB: JVNDB-2010-004158 // PACKETSTORM: 91078 // CNNVD: CNNVD-201006-347 // NVD: CVE-2010-2350

CREDITS

Unknown

Trust: 0.3

sources: BID: 78881

SOURCES

db:CNVDid:CNVD-2010-1125
db:VULMONid:CVE-2010-2350
db:BIDid:78881
db:JVNDBid:JVNDB-2010-004158
db:PACKETSTORMid:91078
db:CNNVDid:CNNVD-201006-347
db:NVDid:CVE-2010-2350

LAST UPDATE DATE

2025-04-11T23:12:16.881000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-1125date:2010-06-18T00:00:00
db:VULMONid:CVE-2010-2350date:2017-08-17T00:00:00
db:BIDid:78881date:2010-06-21T00:00:00
db:JVNDBid:JVNDB-2010-004158date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-201006-347date:2010-06-23T00:00:00
db:NVDid:CVE-2010-2350date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-1125date:2010-06-18T00:00:00
db:VULMONid:CVE-2010-2350date:2010-06-21T00:00:00
db:BIDid:78881date:2010-06-21T00:00:00
db:JVNDBid:JVNDB-2010-004158date:2012-06-26T00:00:00
db:PACKETSTORMid:91078date:2010-06-28T07:29:27
db:CNNVDid:CNNVD-201006-347date:2010-06-23T00:00:00
db:NVDid:CVE-2010-2350date:2010-06-21T19:30:02.087