{"id":"CVE-2006-1060","details":"Heap-based buffer overflow in zgv before 5.8 and xzgv before 0.8 might allow user-assisted attackers to execute arbitrary code via a JPEG image with more than 3 output components, such as a CMYK or YCCK color space, which causes less memory to be allocated than required.","modified":"2026-04-10T03:38:22.677491Z","published":"2006-04-11T10:02:00Z","related":["openSUSE-SU-2024:10151-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/19571"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19572"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19731"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19757"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19779"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19790"},{"type":"ADVISORY","url":"http://www.debian.org/security/2006/dsa-1037"},{"type":"ADVISORY","url":"http://www.debian.org/security/2006/dsa-1038"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_08_sr.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/1288"},{"type":"FIX","url":"http://secunia.com/advisories/19757"},{"type":"FIX","url":"http://secunia.com/advisories/19779"},{"type":"WEB","url":"http://securityreason.com/securityalert/756"},{"type":"WEB","url":"http://www.securityfocus.com/bid/17409"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25718"}],"schema_version":"1.7.5"}