ID CVE-2007-0654
Summary Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:x_multimedia_system:x_multimedia_system:1.2.10
    cpe:2.3:a:x_multimedia_system:x_multimedia_system:1.2.10
CVSS
Base: 9.3 (as of 23-03-2007 - 10:01)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_XMMS-3075.NASL
    description Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files. (CVE-2007-0653 / CVE-2007-0654)
    last seen 2019-02-21
    modified 2012-05-17
    plugin id 29602
    published 2007-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29602
    title SuSE 10 Security Update : XMMS (ZYPP Patch Number 3075)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1277.NASL
    description Multiple errors have been found in the skin handling routines in xmms, the X Multimedia System. These vulnerabilities could allow an attacker to run arbitrary code as the user running xmms by inducing the victim to load specially crafted interface skin files.
    last seen 2019-02-21
    modified 2018-07-20
    plugin id 25011
    published 2007-04-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=25011
    title Debian DSA-1277-1 : XMMS - several vulnerabilities
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_20E23B65A52E11E3AE3A00224D7C32A2.NASL
    description Secunia reports : Secunia Research has discovered two vulnerabilities in XMMS, which can be exploited by malicious people to compromise a user's system. 1) An integer underflow error exists in the processing of skin bitmap images. This can be exploited to cause a stack-based buffer overflow via specially crafted skin images containing manipulated header information. Successful exploitation allows execution of arbitrary code. 2) An integer overflow error exists in the processing of skin bitmap images. This can be exploited to cause memory corruption via specially crafted skin images containing manipulated header information. Successful exploitation may allow the execution of arbitrary code.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 72872
    published 2014-03-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72872
    title FreeBSD : xmms -- Integer Overflow And Underflow Vulnerabilities (20e23b65-a52e-11e3-ae3a-00224d7c32a2)
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_11483.NASL
    description Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files. (CVE-2007-0653 / CVE-2007-0654)
    last seen 2019-02-21
    modified 2012-04-23
    plugin id 41122
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41122
    title SuSE9 Security Update : XMMS (YOU Patch Number 11483)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_XMMS-3073.NASL
    description Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files (CVE-2007-0653,CVE-2007-0654).
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27490
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27490
    title openSUSE 10 Security Update : xmms (xmms-3073)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-445-1.NASL
    description Sven Krewitt of Secunia Research discovered that XMMS did not correctly handle BMP images when loading GUI skins. If a user were tricked into loading a specially crafted skin, a remote attacker could execute arbitrary code with user privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 28042
    published 2007-11-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=28042
    title Ubuntu 5.10 / 6.06 LTS / 6.10 : xmms vulnerabilities (USN-445-1)
refmap via4
bid 23078
bugtraq 20070321 Secunia Research: XMMS Integer Overflow and UnderflowVulnerabilities
debian DSA-1277
mandriva MDKSA-2007:071
misc http://secunia.com/secunia_research/2007-47/advisory/
secunia
  • 23986
  • 24645
  • 24804
  • 24889
suse SUSE-SR:2007:006
ubuntu USN-445-1
vupen ADV-2007-1057
xf xmms-skinbitmap-bo(33203)
statements via4
contributor Mark J Cox
lastmodified 2008-04-04
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=228013 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.
Last major update 07-03-2011 - 21:50
Published 21-03-2007 - 18:19
Last modified 16-10-2018 - 12:33
Back to Top