fkie_cve-2007-1797
Vulnerability from fkie_nvd
Published
2007-04-02 22:19
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
References
cve@mitre.orghttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/24721
cve@mitre.orghttp://secunia.com/advisories/24739
cve@mitre.orghttp://secunia.com/advisories/25072
cve@mitre.orghttp://secunia.com/advisories/25206
cve@mitre.orghttp://secunia.com/advisories/25992
cve@mitre.orghttp://secunia.com/advisories/26177
cve@mitre.orghttp://secunia.com/advisories/29786
cve@mitre.orghttp://secunia.com/advisories/29857
cve@mitre.orghttp://secunia.com/advisories/36260
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200705-13.xml
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1858
cve@mitre.orghttp://www.imagemagick.org/script/changelog.php
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:147
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_8_sr.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0145.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0165.html
cve@mitre.orghttp://www.securityfocus.com/bid/23252
cve@mitre.orghttp://www.securityfocus.com/bid/23347
cve@mitre.orghttp://www.securitytracker.com/id?1017839
cve@mitre.orghttp://www.ubuntu.com/usn/usn-481-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1200
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/33376
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/33377
cve@mitre.orghttps://issues.foresightlinux.org/browse/FL-222
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1205
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24721
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24739
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25072
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25206
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25992
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26177
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29786
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29857
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36260
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200705-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1858
af854a3a-2127-422b-91ae-364da2661108http://www.imagemagick.org/script/changelog.php
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_8_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0145.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0165.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23252
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23347
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017839
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-481-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1200
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33376
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33377
af854a3a-2127-422b-91ae-364da2661108https://issues.foresightlinux.org/browse/FL-222
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1205
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A67EC834-E5DA-4B2A-B367-E59E9CA90CB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BDE29F9-EE0A-4515-AF2A-9EB0446B2D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1FD5DCA-BAE9-47CB-BF31-F04FFA501B30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72CD58D-BEE3-4648-9C52-B60683965709",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A1E728-9D17-47AC-A4E0-F33E00F9C6EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "780EF8D0-A3ED-49D8-92B8-C62BD4FA26E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E0B22AE-4C98-4375-8AEE-3E74B8E4812E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "506C2BA5-7E5C-4691-99E2-2071552877B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C99BF5A1-55C3-4406-BE0C-E2583FB27017",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDF952A1-AE69-4936-BBA6-8B2F6256A0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*",
              "matchCriteriaId": "710C4C5B-BEE4-4E7A-AC1A-51EF404B27C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "763E4543-93AD-4860-A118-F8D1D5A1736F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3B8CD6E-8DA5-4BA4-AE31-5F0288D6F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CFC49A6-9DF5-4C89-A2D3-1F6C0A73C1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD097402-65AC-4D8B-94AC-B298E9B0327C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "89F1E5F1-71D4-4B32-A073-6D41653BA140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8DB9368-67E0-4EEE-8F4B-950AA5B37B29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3115E096-86FD-4225-A580-6E4670DD170F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "069ADDAE-6CD4-4A0C-969D-2181E30F071C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F14D1C-F403-4F04-903E-3F4502C6193C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D9337EF-2A41-4AC4-86D8-AC08C17617BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43A84112-81B0-4867-85F1-A19296D65AC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "26DCFB60-A979-4683-84A0-1C71C0E9241E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "470014AC-02A7-4332-BE7D-DF012E9E29F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E6189E9-D6FA-4B16-A09A-E7B8C74984A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9D90D96-14AB-40FC-8ADE-07DBB77F4975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "365BD82F-FE74-4044-8464-A35B4E971D27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AB4627D-79E3-442B-8768-02159C76BA74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "75F656CD-B9FE-45ED-AA31-574BA346D50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDC51A7C-60BD-4995-921B-01889EC56CEE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer de enteros en ImageMagick anterior a 6.3.3-5 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (1) una imagen manipulada DCM, lo cual resulta en un desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ReadDCMImage , o (2) el campo (a) colors o (b) comments en una imagen manipulada XWD, lo cual resulta un desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ReadXWDImage, un asunto diferente que el CVE-2007-1667."
    }
  ],
  "id": "CVE-2007-1797",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-04-02T22:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24721"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24739"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25072"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25206"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25992"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26177"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29786"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29857"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/36260"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200705-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1858"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.imagemagick.org/script/changelog.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0165.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23252"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23347"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1017839"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-481-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1200"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33376"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33377"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.foresightlinux.org/browse/FL-222"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1205"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24739"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25206"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25992"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29857"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36260"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200705-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1858"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.imagemagick.org/script/changelog.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0165.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23252"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23347"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1017839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-481-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1200"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.foresightlinux.org/browse/FL-222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…