Examples of using Integer overflow in English and their translations into French
{-}
-
Colloquial
-
Official
It was discovered that an integer overflow in text/enhanced message parsing allows the execution of arbitrary code.
Stefan Esser discovered that an integer overflow in memory allocation routines allows the bypass of memory limit restrictions.
Bailey from Lab Mouse Security discovered an integer overflow flaw in the way the lzo library decompressed certain archives compressed with the LZO algorithm.
was vulnerable to an integer overflow attack.
Jesse Ruderman discovered that the layout engine is vulnerable to DoS attacks that might trigger memory corruption and an integer overflow.
the kernel was not affected by the integer overflow issues and the remaining problems will be fixed in version 3.2.73-2+deb7u3.
Incorrect integer size parameters used in wrappers for standard C allocators could cause integer truncation and lead to integer overflow issues.
Yihan Lian of the Cloud Security Team, Qihoo 360 discovered an integer overflow in the x86 shadow pagetable code.
Local users with permission to open /dev/snd/controlC0 can create an integer overflow condition that causes a denial of service.
fix integer overflow in timezone code; local/manpages/gai. conf.5.
Integer overflow in the strcoll and wcscoll functions allows context-dependent attackers to cause a denial of service(crash)
It was discovered that an integer overflow in the"Probe Request" packet parser of the Ralinktech wireless drivers might lead to remote denial of service
An integer overflow leading to a heap-based buffer overflow when processing the Content-Length header of an HTTP request can be used by an attacker to execute arbitrary code via crafted POST requests containing negative Content-Length values.
Integer overflow in the ljpeg_start function in dcraw 7.00
Clement Lecigne from the Google Security Team reported an integer overflow in computing the size of a temporary buffer in the IP multicast code,
By exploiting an integer overflow in the SCTP_AUTH_KEY handling code,
an implementation of the Point-to-Point Protocol: an integer overflow in the routine responsible for parsing user-supplied options potentially allows a local attacker to gain root privileges.
An integer overflow may occur in the computation of the size of the glyph to be allocated by the AllocateGlyph() function which will cause less memory to be allocated than expected, leading to later heap overflow. .
Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2
The Java2D C code contains an integer overflow which results in a heap-based buffer overflow,