Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) prior to 8.5.1 allows remote malicious users to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tcl tk tcl tk 8.5_a3 |
||
tcl tk tcl tk |
||
tcl tk tcl tk 8.5a5 |
||
tcl tk tcl tk 8.4.14 |
||
tcl tk tcl tk 8.4.9 |
||
tcl tk tcl tk 8.5a2 |
||
tcl tk tcl tk 8.4.3 |
||
tcl tk tcl tk 8.4.2 |
||
tcl tk tcl tk 8.4a3 |
||
tcl tk tcl tk 8.3.3 |
||
tcl tk tcl tk 8.2.1 |
||
tcl tk tcl tk 8.2.0 |
||
tcl tk tcl tk 8.0 |
||
tcl tk tcl tk 7.6p2 |
||
tcl tk tcl tk 6.2 |
||
tcl tk tcl tk 6.7 |
||
tcl tk tcl tk 4.0p1 |
||
tcl tk tcl tk 2.1 |
||
tcl tk tcl tk 8.5b2 |
||
tcl tk tcl tk 8.5b1 |
||
tcl tk tcl tk 8.4.12 |
||
tcl tk tcl tk 8.4.11 |
||
tcl tk tcl tk 8.5a1 |
||
tcl tk tcl tk 8.4.6 |
||
tcl tk tcl tk 8.4.0 |
||
tcl tk tcl tk 8.4b2 |
||
tcl tk tcl tk 8.4b1 |
||
tcl tk tcl tk 8.3.1 |
||
tcl tk tcl tk 8.3.0 |
||
tcl tk tcl tk 8.0.5 |
||
tcl tk tcl tk 8.0.4 |
||
tcl tk tcl tk 7.4 |
||
tcl tk tcl tk 7.3 |
||
tcl tk tcl tk 6.4 |
||
tcl tk tcl tk 3.3 |
||
tcl tk tcl tk 8.5.0 |
||
tcl tk tcl tk 8.5b3 |
||
tcl tk tcl tk 8.5a4 |
||
tcl tk tcl tk 8.4.13 |
||
tcl tk tcl tk 8.4.8 |
||
tcl tk tcl tk 8.4.7 |
||
tcl tk tcl tk 8.4.1 |
||
tcl tk tcl tk 8.3.5 |
||
tcl tk tcl tk 8.4a2 |
||
tcl tk tcl tk 8.3.2 |
||
tcl tk tcl tk 8.1.1 |
||
tcl tk tcl tk 8.1 |
||
tcl tk tcl tk 7.6 |
||
tcl tk tcl tk 7.5p1 |
||
tcl tk tcl tk 7.5 |
||
tcl tk tcl tk 6.6 |
||
tcl tk tcl tk 6.5 |
||
tcl tk tcl tk 8.4.16 |
||
tcl tk tcl tk 8.4.15 |
||
tcl tk tcl tk 8.5a6 |
||
tcl tk tcl tk 8.5a3 |
||
tcl tk tcl tk 8.4.10 |
||
tcl tk tcl tk 8.4.5 |
||
tcl tk tcl tk 8.4.4 |
||
tcl tk tcl tk 8.4a4 |
||
tcl tk tcl tk 8.3.4 |
||
tcl tk tcl tk 8.2.3 |
||
tcl tk tcl tk 8.2.2 |
||
tcl tk tcl tk 8.0.3 |
||
tcl tk tcl tk 8.0p2 |
||
tcl tk tcl tk 7.1 |
||
tcl tk tcl tk 7.0 |
||
tcl tk tcl tk 6.1 |
||
tcl tk tcl tk 6.1p1 |