fkie_cve-2007-1797
Vulnerability from fkie_nvd
Published
2007-04-02 22:19
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| imagemagick | imagemagick | 6.3.0.0 | |
| imagemagick | imagemagick | 6.3.0.1 | |
| imagemagick | imagemagick | 6.3.0.2 | |
| imagemagick | imagemagick | 6.3.0.3 | |
| imagemagick | imagemagick | 6.3.0.4 | |
| imagemagick | imagemagick | 6.3.0.5 | |
| imagemagick | imagemagick | 6.3.0.7 | |
| imagemagick | imagemagick | 6.3.0.8 | |
| imagemagick | imagemagick | 6.3.1.0 | |
| imagemagick | imagemagick | 6.3.1.1 | |
| imagemagick | imagemagick | 6.3.1.2. | |
| imagemagick | imagemagick | 6.3.1.3 | |
| imagemagick | imagemagick | 6.3.1.4 | |
| imagemagick | imagemagick | 6.3.1.5 | |
| imagemagick | imagemagick | 6.3.1.6 | |
| imagemagick | imagemagick | 6.3.1.7 | |
| imagemagick | imagemagick | 6.3.2.0 | |
| imagemagick | imagemagick | 6.3.2.1 | |
| imagemagick | imagemagick | 6.3.2.2 | |
| imagemagick | imagemagick | 6.3.2.3 | |
| imagemagick | imagemagick | 6.3.2.4 | |
| imagemagick | imagemagick | 6.3.2.5 | |
| imagemagick | imagemagick | 6.3.2.6 | |
| imagemagick | imagemagick | 6.3.2.7 | |
| imagemagick | imagemagick | 6.3.2.8 | |
| imagemagick | imagemagick | 6.3.3.0 | |
| imagemagick | imagemagick | 6.3.3.1 | |
| imagemagick | imagemagick | 6.3.3.2 | |
| imagemagick | imagemagick | 6.3.3.3 | |
| imagemagick | imagemagick | 6.3.3.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A67EC834-E5DA-4B2A-B367-E59E9CA90CB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BDE29F9-EE0A-4515-AF2A-9EB0446B2D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F1FD5DCA-BAE9-47CB-BF31-F04FFA501B30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E72CD58D-BEE3-4648-9C52-B60683965709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "16A1E728-9D17-47AC-A4E0-F33E00F9C6EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "780EF8D0-A3ED-49D8-92B8-C62BD4FA26E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0B22AE-4C98-4375-8AEE-3E74B8E4812E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "506C2BA5-7E5C-4691-99E2-2071552877B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C99BF5A1-55C3-4406-BE0C-E2583FB27017",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF952A1-AE69-4936-BBA6-8B2F6256A0D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*",
"matchCriteriaId": "710C4C5B-BEE4-4E7A-AC1A-51EF404B27C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "763E4543-93AD-4860-A118-F8D1D5A1736F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C3B8CD6E-8DA5-4BA4-AE31-5F0288D6F478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFC49A6-9DF5-4C89-A2D3-1F6C0A73C1EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FD097402-65AC-4D8B-94AC-B298E9B0327C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "89F1E5F1-71D4-4B32-A073-6D41653BA140",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C8DB9368-67E0-4EEE-8F4B-950AA5B37B29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3115E096-86FD-4225-A580-6E4670DD170F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "069ADDAE-6CD4-4A0C-969D-2181E30F071C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "92F14D1C-F403-4F04-903E-3F4502C6193C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7D9337EF-2A41-4AC4-86D8-AC08C17617BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "43A84112-81B0-4867-85F1-A19296D65AC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "26DCFB60-A979-4683-84A0-1C71C0E9241E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "470014AC-02A7-4332-BE7D-DF012E9E29F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3E6189E9-D6FA-4B16-A09A-E7B8C74984A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B9D90D96-14AB-40FC-8ADE-07DBB77F4975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "365BD82F-FE74-4044-8464-A35B4E971D27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6AB4627D-79E3-442B-8768-02159C76BA74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "75F656CD-B9FE-45ED-AA31-574BA346D50B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FDC51A7C-60BD-4995-921B-01889EC56CEE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer de enteros en ImageMagick anterior a 6.3.3-5 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (1) una imagen manipulada DCM, lo cual resulta en un desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ReadDCMImage , o (2) el campo (a) colors o (b) comments en una imagen manipulada XWD, lo cual resulta un desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ReadXWDImage, un asunto diferente que el CVE-2007-1667."
}
],
"id": "CVE-2007-1797",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2007-04-02T22:19:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/24721"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/24739"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25072"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25206"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25992"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/26177"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/29786"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/29857"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/36260"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200705-13.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2009/dsa-1858"
},
{
"source": "cve@mitre.org",
"url": "http://www.imagemagick.org/script/changelog.php"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147"
},
{
"source": "cve@mitre.org",
"url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0165.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/23252"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/23347"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017839"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-481-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/1200"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33376"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33377"
},
{
"source": "cve@mitre.org",
"url": "https://issues.foresightlinux.org/browse/FL-222"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-1205"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24721"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24739"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25072"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25206"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25992"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29786"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29857"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36260"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200705-13.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.imagemagick.org/script/changelog.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0165.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/23252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/23347"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017839"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-481-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/1200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33376"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.foresightlinux.org/browse/FL-222"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-1205"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…