CVE-2007-1797

Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
References
Link Resource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496 Patch Vendor Advisory
http://secunia.com/advisories/24721
http://secunia.com/advisories/24739
http://secunia.com/advisories/25072
http://secunia.com/advisories/25206
http://secunia.com/advisories/25992
http://secunia.com/advisories/26177
http://secunia.com/advisories/29786
http://secunia.com/advisories/29857
http://secunia.com/advisories/36260
http://security.gentoo.org/glsa/glsa-200705-13.xml
http://www.debian.org/security/2009/dsa-1858
http://www.imagemagick.org/script/changelog.php
http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
http://www.novell.com/linux/security/advisories/2007_8_sr.html
http://www.redhat.com/support/errata/RHSA-2008-0145.html
http://www.redhat.com/support/errata/RHSA-2008-0165.html
http://www.securityfocus.com/bid/23252
http://www.securityfocus.com/bid/23347
http://www.securitytracker.com/id?1017839
http://www.ubuntu.com/usn/usn-481-1
http://www.vupen.com/english/advisories/2007/1200
https://exchange.xforce.ibmcloud.com/vulnerabilities/33376
https://exchange.xforce.ibmcloud.com/vulnerabilities/33377
https://issues.foresightlinux.org/browse/FL-222
https://issues.rpath.com/browse/RPL-1205
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496 Patch Vendor Advisory
http://secunia.com/advisories/24721
http://secunia.com/advisories/24739
http://secunia.com/advisories/25072
http://secunia.com/advisories/25206
http://secunia.com/advisories/25992
http://secunia.com/advisories/26177
http://secunia.com/advisories/29786
http://secunia.com/advisories/29857
http://secunia.com/advisories/36260
http://security.gentoo.org/glsa/glsa-200705-13.xml
http://www.debian.org/security/2009/dsa-1858
http://www.imagemagick.org/script/changelog.php
http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
http://www.novell.com/linux/security/advisories/2007_8_sr.html
http://www.redhat.com/support/errata/RHSA-2008-0145.html
http://www.redhat.com/support/errata/RHSA-2008-0165.html
http://www.securityfocus.com/bid/23252
http://www.securityfocus.com/bid/23347
http://www.securitytracker.com/id?1017839
http://www.ubuntu.com/usn/usn-481-1
http://www.vupen.com/english/advisories/2007/1200
https://exchange.xforce.ibmcloud.com/vulnerabilities/33376
https://exchange.xforce.ibmcloud.com/vulnerabilities/33377
https://issues.foresightlinux.org/browse/FL-222
https://issues.rpath.com/browse/RPL-1205
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:29

Type Values Removed Values Added
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496 - Patch, Vendor Advisory () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496 - Patch, Vendor Advisory
References () http://secunia.com/advisories/24721 - () http://secunia.com/advisories/24721 -
References () http://secunia.com/advisories/24739 - () http://secunia.com/advisories/24739 -
References () http://secunia.com/advisories/25072 - () http://secunia.com/advisories/25072 -
References () http://secunia.com/advisories/25206 - () http://secunia.com/advisories/25206 -
References () http://secunia.com/advisories/25992 - () http://secunia.com/advisories/25992 -
References () http://secunia.com/advisories/26177 - () http://secunia.com/advisories/26177 -
References () http://secunia.com/advisories/29786 - () http://secunia.com/advisories/29786 -
References () http://secunia.com/advisories/29857 - () http://secunia.com/advisories/29857 -
References () http://secunia.com/advisories/36260 - () http://secunia.com/advisories/36260 -
References () http://security.gentoo.org/glsa/glsa-200705-13.xml - () http://security.gentoo.org/glsa/glsa-200705-13.xml -
References () http://www.debian.org/security/2009/dsa-1858 - () http://www.debian.org/security/2009/dsa-1858 -
References () http://www.imagemagick.org/script/changelog.php - () http://www.imagemagick.org/script/changelog.php -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:147 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:147 -
References () http://www.novell.com/linux/security/advisories/2007_8_sr.html - () http://www.novell.com/linux/security/advisories/2007_8_sr.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0145.html - () http://www.redhat.com/support/errata/RHSA-2008-0145.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0165.html - () http://www.redhat.com/support/errata/RHSA-2008-0165.html -
References () http://www.securityfocus.com/bid/23252 - () http://www.securityfocus.com/bid/23252 -
References () http://www.securityfocus.com/bid/23347 - () http://www.securityfocus.com/bid/23347 -
References () http://www.securitytracker.com/id?1017839 - () http://www.securitytracker.com/id?1017839 -
References () http://www.ubuntu.com/usn/usn-481-1 - () http://www.ubuntu.com/usn/usn-481-1 -
References () http://www.vupen.com/english/advisories/2007/1200 - () http://www.vupen.com/english/advisories/2007/1200 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/33376 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/33376 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/33377 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/33377 -
References () https://issues.foresightlinux.org/browse/FL-222 - () https://issues.foresightlinux.org/browse/FL-222 -
References () https://issues.rpath.com/browse/RPL-1205 - () https://issues.rpath.com/browse/RPL-1205 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254 -

Information

Published : 2007-04-02 22:19

Updated : 2024-11-21 00:29


NVD link : CVE-2007-1797

Mitre link : CVE-2007-1797

CVE.ORG link : CVE-2007-1797


JSON object : View

Products Affected

imagemagick

  • imagemagick
CWE
CWE-189

Numeric Errors