Multiple buffer overflows in WinImage 8.0.8000 allow user-assisted remote attackers to execute arbitrary code via a FAT image that contains long directory names in a deeply nested directory structure, which triggers (1) a stack-based buffer overflow during extraction, or (2) a heap-based buffer overflow during traversal.
References
Configurations
History
21 Nov 2024, 00:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/36081 - | |
References | () http://osvdb.org/36082 - | |
References | () http://secunia.com/advisories/25277 - Vendor Advisory | |
References | () http://vuln.sg/winimage808000-en.html - | |
References | () http://www.securityfocus.com/bid/24026 - | |
References | () http://www.vupen.com/english/advisories/2007/1854 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34359 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34360 - |
Information
Published : 2007-05-18 22:30
Updated : 2024-11-21 00:31
NVD link : CVE-2007-2758
Mitre link : CVE-2007-2758
CVE.ORG link : CVE-2007-2758
JSON object : View
Products Affected
winimage
- winimage
CWE