CVE-2007-4988 (GCVE-0-2007-4988)
Vulnerability from cvelistv5
Published
2007-09-24 22:00
Modified
2024-08-07 15:17
Severity ?
CWE
  • n/a
Summary
Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.
References
cve@mitre.org http://bugs.gentoo.org/show_bug.cgi?id=186030 Issue Tracking
cve@mitre.org http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597 Broken Link
cve@mitre.org http://secunia.com/advisories/26926 Broken Link
cve@mitre.org http://secunia.com/advisories/27048 Broken Link
cve@mitre.org http://secunia.com/advisories/27309 Broken Link
cve@mitre.org http://secunia.com/advisories/27364 Broken Link
cve@mitre.org http://secunia.com/advisories/27439 Broken Link
cve@mitre.org http://secunia.com/advisories/28721 Broken Link
cve@mitre.org http://secunia.com/advisories/29786 Broken Link
cve@mitre.org http://secunia.com/advisories/36260 Broken Link
cve@mitre.org http://security.gentoo.org/glsa/glsa-200710-27.xml Third Party Advisory
cve@mitre.org http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html Broken Link
cve@mitre.org http://www.debian.org/security/2009/dsa-1858 Mailing List, Third Party Advisory
cve@mitre.org http://www.imagemagick.org/script/changelog.php Release Notes
cve@mitre.org http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035 Broken Link
cve@mitre.org http://www.novell.com/linux/security/advisories/2007_23_sr.html Broken Link
cve@mitre.org http://www.redhat.com/support/errata/RHSA-2008-0145.html Broken Link
cve@mitre.org http://www.securityfocus.com/archive/1/483572/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
cve@mitre.org http://www.securityfocus.com/bid/25765 Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry
cve@mitre.org http://www.securitytracker.com/id?1018729 Broken Link, Third Party Advisory, VDB Entry
cve@mitre.org http://www.ubuntu.com/usn/usn-523-1 Third Party Advisory
cve@mitre.org http://www.vupen.com/english/advisories/2007/3245 Broken Link
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/36737 Third Party Advisory, VDB Entry
cve@mitre.org https://issues.rpath.com/browse/RPL-1743 Broken Link
cve@mitre.org https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://bugs.gentoo.org/show_bug.cgi?id=186030 Issue Tracking
af854a3a-2127-422b-91ae-364da2661108 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/26926 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/27048 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/27309 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/27364 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/27439 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/28721 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/29786 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/36260 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://security.gentoo.org/glsa/glsa-200710-27.xml Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2009/dsa-1858 Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.imagemagick.org/script/changelog.php Release Notes
af854a3a-2127-422b-91ae-364da2661108 http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://www.novell.com/linux/security/advisories/2007_23_sr.html Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://www.redhat.com/support/errata/RHSA-2008-0145.html Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/483572/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/25765 Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108 http://www.securitytracker.com/id?1018729 Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108 http://www.ubuntu.com/usn/usn-523-1 Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2007/3245 Broken Link
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/36737 Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108 https://issues.rpath.com/browse/RPL-1743 Broken Link
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656 Broken Link
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:17:27.869Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "27364",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27364"
          },
          {
            "name": "RHSA-2008:0145",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html"
          },
          {
            "name": "20071112 FLEA-2007-0066-1 ImageMagick",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/483572/100/0/threaded"
          },
          {
            "name": "USN-523-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-523-1"
          },
          {
            "name": "27309",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27309"
          },
          {
            "name": "29786",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29786"
          },
          {
            "name": "25765",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25765"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.imagemagick.org/script/changelog.php"
          },
          {
            "name": "ADV-2007-3245",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3245"
          },
          {
            "name": "20070919 Multiple Vendor ImageMagick Sign Extension Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597"
          },
          {
            "name": "GLSA-200710-27",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200710-27.xml"
          },
          {
            "name": "1018729",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018729"
          },
          {
            "name": "27048",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27048"
          },
          {
            "name": "imagemagick-readdibimage-bo(36737)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36737"
          },
          {
            "name": "28721",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28721"
          },
          {
            "name": "27439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27439"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1743"
          },
          {
            "name": "DSA-1858",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1858"
          },
          {
            "name": "[Magick-announce] 20070917 ImageMagick 6.3.5-9, important security updates",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html"
          },
          {
            "name": "26926",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26926"
          },
          {
            "name": "MDVSA-2008:035",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035"
          },
          {
            "name": "oval:org.mitre.oval:def:9656",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=186030"
          },
          {
            "name": "SUSE-SR:2007:023",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
          },
          {
            "name": "36260",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36260"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "27364",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27364"
        },
        {
          "name": "RHSA-2008:0145",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html"
        },
        {
          "name": "20071112 FLEA-2007-0066-1 ImageMagick",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/483572/100/0/threaded"
        },
        {
          "name": "USN-523-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-523-1"
        },
        {
          "name": "27309",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27309"
        },
        {
          "name": "29786",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29786"
        },
        {
          "name": "25765",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25765"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.imagemagick.org/script/changelog.php"
        },
        {
          "name": "ADV-2007-3245",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3245"
        },
        {
          "name": "20070919 Multiple Vendor ImageMagick Sign Extension Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597"
        },
        {
          "name": "GLSA-200710-27",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200710-27.xml"
        },
        {
          "name": "1018729",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018729"
        },
        {
          "name": "27048",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27048"
        },
        {
          "name": "imagemagick-readdibimage-bo(36737)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36737"
        },
        {
          "name": "28721",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28721"
        },
        {
          "name": "27439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27439"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1743"
        },
        {
          "name": "DSA-1858",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1858"
        },
        {
          "name": "[Magick-announce] 20070917 ImageMagick 6.3.5-9, important security updates",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html"
        },
        {
          "name": "26926",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26926"
        },
        {
          "name": "MDVSA-2008:035",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035"
        },
        {
          "name": "oval:org.mitre.oval:def:9656",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=186030"
        },
        {
          "name": "SUSE-SR:2007:023",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
        },
        {
          "name": "36260",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36260"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4988",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "27364",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27364"
            },
            {
              "name": "RHSA-2008:0145",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html"
            },
            {
              "name": "20071112 FLEA-2007-0066-1 ImageMagick",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/483572/100/0/threaded"
            },
            {
              "name": "USN-523-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-523-1"
            },
            {
              "name": "27309",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27309"
            },
            {
              "name": "29786",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29786"
            },
            {
              "name": "25765",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25765"
            },
            {
              "name": "http://www.imagemagick.org/script/changelog.php",
              "refsource": "CONFIRM",
              "url": "http://www.imagemagick.org/script/changelog.php"
            },
            {
              "name": "ADV-2007-3245",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3245"
            },
            {
              "name": "20070919 Multiple Vendor ImageMagick Sign Extension Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597"
            },
            {
              "name": "GLSA-200710-27",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200710-27.xml"
            },
            {
              "name": "1018729",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018729"
            },
            {
              "name": "27048",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27048"
            },
            {
              "name": "imagemagick-readdibimage-bo(36737)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36737"
            },
            {
              "name": "28721",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28721"
            },
            {
              "name": "27439",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27439"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1743",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1743"
            },
            {
              "name": "DSA-1858",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1858"
            },
            {
              "name": "[Magick-announce] 20070917 ImageMagick 6.3.5-9, important security updates",
              "refsource": "MLIST",
              "url": "http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html"
            },
            {
              "name": "26926",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26926"
            },
            {
              "name": "MDVSA-2008:035",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035"
            },
            {
              "name": "oval:org.mitre.oval:def:9656",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=186030",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=186030"
            },
            {
              "name": "SUSE-SR:2007:023",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
            },
            {
              "name": "36260",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36260"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4988",
    "datePublished": "2007-09-24T22:00:00",
    "dateReserved": "2007-09-19T00:00:00",
    "dateUpdated": "2024-08-07T15:17:27.869Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-4988\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-09-24T22:17:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Error de extensi\u00f3n de signo en la funci\u00f3n ReadDIBImage de ImageMagick versiones anteriores a 6.3.5-9 permite a atacantes locales o remotos dependientes del contexto ejecutar c\u00f3digo de su elecci\u00f3n mediante un valor de ancho manipulado en un fichero de imagen, que dispara un desbordamiento de entero\\r\\ny un desbordamiento de b\u00fafer basado en pila.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-681\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.3.5-9\",\"matchCriteriaId\":\"12DE5EB8-BDC6-4D86-B3DD-0610E9DF93D9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E304C9-F780-4358-A58D-1E4C93977704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBDAFF8-DE44-4E80-B6BD-E341F767F501\"}]}]}],\"references\":[{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=186030\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26926\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27048\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27309\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27364\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27439\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28721\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29786\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36260\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200710-27.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1858\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.imagemagick.org/script/changelog.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_23_sr.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0145.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/483572/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/25765\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Exploit\",\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1018729\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-523-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/3245\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36737\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1743\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=186030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26926\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27048\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27309\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27364\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27439\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29786\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36260\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200710-27.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.imagemagick.org/script/changelog.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_23_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0145.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/483572/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/25765\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Exploit\",\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1018729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-523-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/3245\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36737\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1743\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…