fkie_cve-2007-1797
Vulnerability from fkie_nvd
Published
2007-04-02 22:19
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
imagemagick | imagemagick | 6.3.0.0 | |
imagemagick | imagemagick | 6.3.0.1 | |
imagemagick | imagemagick | 6.3.0.2 | |
imagemagick | imagemagick | 6.3.0.3 | |
imagemagick | imagemagick | 6.3.0.4 | |
imagemagick | imagemagick | 6.3.0.5 | |
imagemagick | imagemagick | 6.3.0.7 | |
imagemagick | imagemagick | 6.3.0.8 | |
imagemagick | imagemagick | 6.3.1.0 | |
imagemagick | imagemagick | 6.3.1.1 | |
imagemagick | imagemagick | 6.3.1.2. | |
imagemagick | imagemagick | 6.3.1.3 | |
imagemagick | imagemagick | 6.3.1.4 | |
imagemagick | imagemagick | 6.3.1.5 | |
imagemagick | imagemagick | 6.3.1.6 | |
imagemagick | imagemagick | 6.3.1.7 | |
imagemagick | imagemagick | 6.3.2.0 | |
imagemagick | imagemagick | 6.3.2.1 | |
imagemagick | imagemagick | 6.3.2.2 | |
imagemagick | imagemagick | 6.3.2.3 | |
imagemagick | imagemagick | 6.3.2.4 | |
imagemagick | imagemagick | 6.3.2.5 | |
imagemagick | imagemagick | 6.3.2.6 | |
imagemagick | imagemagick | 6.3.2.7 | |
imagemagick | imagemagick | 6.3.2.8 | |
imagemagick | imagemagick | 6.3.3.0 | |
imagemagick | imagemagick | 6.3.3.1 | |
imagemagick | imagemagick | 6.3.3.2 | |
imagemagick | imagemagick | 6.3.3.3 | |
imagemagick | imagemagick | 6.3.3.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A67EC834-E5DA-4B2A-B367-E59E9CA90CB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BDE29F9-EE0A-4515-AF2A-9EB0446B2D47", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F1FD5DCA-BAE9-47CB-BF31-F04FFA501B30", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "E72CD58D-BEE3-4648-9C52-B60683965709", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "16A1E728-9D17-47AC-A4E0-F33E00F9C6EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "780EF8D0-A3ED-49D8-92B8-C62BD4FA26E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9E0B22AE-4C98-4375-8AEE-3E74B8E4812E", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "506C2BA5-7E5C-4691-99E2-2071552877B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C99BF5A1-55C3-4406-BE0C-E2583FB27017", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EDF952A1-AE69-4936-BBA6-8B2F6256A0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*", "matchCriteriaId": "710C4C5B-BEE4-4E7A-AC1A-51EF404B27C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "763E4543-93AD-4860-A118-F8D1D5A1736F", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C3B8CD6E-8DA5-4BA4-AE31-5F0288D6F478", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4CFC49A6-9DF5-4C89-A2D3-1F6C0A73C1EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FD097402-65AC-4D8B-94AC-B298E9B0327C", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "89F1E5F1-71D4-4B32-A073-6D41653BA140", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8DB9368-67E0-4EEE-8F4B-950AA5B37B29", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3115E096-86FD-4225-A580-6E4670DD170F", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "069ADDAE-6CD4-4A0C-969D-2181E30F071C", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "92F14D1C-F403-4F04-903E-3F4502C6193C", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7D9337EF-2A41-4AC4-86D8-AC08C17617BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "43A84112-81B0-4867-85F1-A19296D65AC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "26DCFB60-A979-4683-84A0-1C71C0E9241E", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "470014AC-02A7-4332-BE7D-DF012E9E29F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "3E6189E9-D6FA-4B16-A09A-E7B8C74984A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9D90D96-14AB-40FC-8ADE-07DBB77F4975", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "365BD82F-FE74-4044-8464-A35B4E971D27", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6AB4627D-79E3-442B-8768-02159C76BA74", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "75F656CD-B9FE-45ED-AA31-574BA346D50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "FDC51A7C-60BD-4995-921B-01889EC56CEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer de enteros en ImageMagick anterior a 6.3.3-5 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (1) una imagen manipulada DCM, lo cual resulta en un desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ReadDCMImage , o (2) el campo (a) colors o (b) comments en una imagen manipulada XWD, lo cual resulta un desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ReadXWDImage, un asunto diferente que el CVE-2007-1667." } ], "id": "CVE-2007-1797", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-04-02T22:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/24721" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/24739" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25072" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25206" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25992" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26177" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29786" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29857" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/36260" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200705-13.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1858" }, { "source": "cve@mitre.org", "url": "http://www.imagemagick.org/script/changelog.php" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0165.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/23252" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/23347" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1017839" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-481-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1200" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33376" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33377" }, { "source": "cve@mitre.org", "url": "https://issues.foresightlinux.org/browse/FL-222" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-1205" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/36260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200705-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.imagemagick.org/script/changelog.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0165.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/23252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/23347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-481-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.foresightlinux.org/browse/FL-222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…