2024-12-08 03:06:42 +00:00

146 lines
4.3 KiB
JSON

{
"id": "CVE-2007-2758",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-05-18T22:30:00.000",
"lastModified": "2024-11-21T00:31:35.327",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in WinImage 8.0.8000 allow user-assisted remote attackers to execute arbitrary code via a FAT image that contains long directory names in a deeply nested directory structure, which triggers (1) a stack-based buffer overflow during extraction, or (2) a heap-based buffer overflow during traversal."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en el WinImage 8.0.8000 permiten a atacantes remotos con la intervenci\u00f3n del usuario ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de la imagen FAT que contiene nombres de directorio largos en una estructura de directorios muy jerarquizada, lo que dispara (1) un desbordamiento de b\u00fafer basado en pila durante la extracci\u00f3n o (2) un desbordamiento de b\u00fafer basado en mont\u00edculo durante un escalado."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:winimage:winimage:8.0.8000:*:*:*:*:*:*:*",
"matchCriteriaId": "1381DCC1-05C1-425C-A427-8CE25D360F02"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/36081",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/36082",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/25277",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://vuln.sg/winimage808000-en.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/24026",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1854",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34359",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34360",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/36081",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/36082",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/25277",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://vuln.sg/winimage808000-en.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/24026",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1854",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34359",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34360",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}