2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2007-6732" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-09-13T22:30:00.267" ,
"lastModified" : "2009-09-14T04:00:00.000" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple buffer overflows in the dtt_load function in loaders/dtt_load.c Extended Module Player (XMP) 2.5.1 and earlier allow remote attackers to execute arbitrary code via unspecified vectors related to an untrusted length value and the (1) pofs and (2) plen arrays."
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiples desbordamientos del b\u00fafer en la funci\u00f3n dtt_load de loaders/dtt_load.c Extended Module Player (XMP) v2.5.1 y anteriores, permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados relacionados con un valor de tama\u00f1o no confiable y los arrays (1) pofs y (2) plen."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 10.0
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:claudio_matsuoka:extended_module_player:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.5.1" ,
"matchCriteriaId" : "75D57072-FB7D-492A-9598-CACE7ECBBF8A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:claudio_matsuoka:extended_module_player:2.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A329FEF0-CCA9-463C-B1A8-742342193815"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:claudio_matsuoka:extended_module_player:2.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB814723-8284-4D7B-AC1F-2BEBE3BBC47E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:claudio_matsuoka:extended_module_player:2.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D8AE9AF-2AFA-4CC1-A434-4AE238A5207B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:claudio_matsuoka:extended_module_player:2.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "13BE4EDE-5BE6-4C1F-9402-C9CDB5B5DB18"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:claudio_matsuoka:extended_module_player:2.3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0E8751F9-9012-45BC-8EEE-B1FD71A070F3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:claudio_matsuoka:extended_module_player:2.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A5793923-D9A1-4A31-A5AD-C73CB8DB7F7C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:claudio_matsuoka:extended_module_player:2.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "767BA633-F914-482F-A517-9ABC19F26529"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:claudio_matsuoka:extended_module_player:2.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A10E8E57-C623-4F06-99D0-2802A5016EC0"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://aluigi.altervista.org/adv/xmpbof-adv.txt" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/27047" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/0009" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
}
]
}