2024-12-08 03:06:42 +00:00

445 lines
15 KiB
JSON

{
"id": "CVE-2007-1797",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-04-02T22:19:00.000",
"lastModified": "2024-11-21T00:29:10.920",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer de enteros en ImageMagick anterior a 6.3.3-5 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (1) una imagen manipulada DCM, lo cual resulta en un desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ReadDCMImage , o (2) el campo (a) colors o (b) comments en una imagen manipulada XWD, lo cual resulta un desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ReadXWDImage, un asunto diferente que el CVE-2007-1667."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A67EC834-E5DA-4B2A-B367-E59E9CA90CB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BDE29F9-EE0A-4515-AF2A-9EB0446B2D47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F1FD5DCA-BAE9-47CB-BF31-F04FFA501B30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E72CD58D-BEE3-4648-9C52-B60683965709"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "16A1E728-9D17-47AC-A4E0-F33E00F9C6EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "780EF8D0-A3ED-49D8-92B8-C62BD4FA26E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0B22AE-4C98-4375-8AEE-3E74B8E4812E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "506C2BA5-7E5C-4691-99E2-2071552877B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C99BF5A1-55C3-4406-BE0C-E2583FB27017"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF952A1-AE69-4936-BBA6-8B2F6256A0D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*",
"matchCriteriaId": "710C4C5B-BEE4-4E7A-AC1A-51EF404B27C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "763E4543-93AD-4860-A118-F8D1D5A1736F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C3B8CD6E-8DA5-4BA4-AE31-5F0288D6F478"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFC49A6-9DF5-4C89-A2D3-1F6C0A73C1EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FD097402-65AC-4D8B-94AC-B298E9B0327C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "89F1E5F1-71D4-4B32-A073-6D41653BA140"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C8DB9368-67E0-4EEE-8F4B-950AA5B37B29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3115E096-86FD-4225-A580-6E4670DD170F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "069ADDAE-6CD4-4A0C-969D-2181E30F071C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "92F14D1C-F403-4F04-903E-3F4502C6193C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7D9337EF-2A41-4AC4-86D8-AC08C17617BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "43A84112-81B0-4867-85F1-A19296D65AC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "26DCFB60-A979-4683-84A0-1C71C0E9241E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "470014AC-02A7-4332-BE7D-DF012E9E29F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3E6189E9-D6FA-4B16-A09A-E7B8C74984A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B9D90D96-14AB-40FC-8ADE-07DBB77F4975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "365BD82F-FE74-4044-8464-A35B4E971D27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6AB4627D-79E3-442B-8768-02159C76BA74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "75F656CD-B9FE-45ED-AA31-574BA346D50B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FDC51A7C-60BD-4995-921B-01889EC56CEE"
}
]
}
]
}
],
"references": [
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/24721",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/24739",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/25072",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/25206",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/25992",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/26177",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/29786",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/29857",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/36260",
"source": "cve@mitre.org"
},
{
"url": "http://security.gentoo.org/glsa/glsa-200705-13.xml",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2009/dsa-1858",
"source": "cve@mitre.org"
},
{
"url": "http://www.imagemagick.org/script/changelog.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147",
"source": "cve@mitre.org"
},
{
"url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0165.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/23252",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/23347",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1017839",
"source": "cve@mitre.org"
},
{
"url": "http://www.ubuntu.com/usn/usn-481-1",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1200",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33376",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33377",
"source": "cve@mitre.org"
},
{
"url": "https://issues.foresightlinux.org/browse/FL-222",
"source": "cve@mitre.org"
},
{
"url": "https://issues.rpath.com/browse/RPL-1205",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254",
"source": "cve@mitre.org"
},
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/24721",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/24739",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/25072",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/25206",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/25992",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/26177",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/29786",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/29857",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/36260",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://security.gentoo.org/glsa/glsa-200705-13.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.debian.org/security/2009/dsa-1858",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.imagemagick.org/script/changelog.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0165.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/23252",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/23347",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1017839",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ubuntu.com/usn/usn-481-1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1200",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33376",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33377",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://issues.foresightlinux.org/browse/FL-222",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://issues.rpath.com/browse/RPL-1205",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}