Multiple vulnerabilities have been identified in ELOG, which could be exploited by attackers to execute arbitrary scripting code, cause a denial of service or compromise a vulnerable system.
The first issue is caused by a buffer overflow error in "elog.c" when processing malformed data, which could be exploited to crash an affected application or execute arbitrary code.
The second vulnerability is caused by an infinite loop in the "replace_inline_img()" [elogd.c] function, which could be exploited to crash an affected application.
The third issue is caused by an input validation error when handling the "subtext" parameter, which could be exploited by attackers to cause arbitrary scripting code to be executed by the administrators's browser in the security context of an affected Web site. |