CVE-2007-2758

Multiple buffer overflows in WinImage 8.0.8000 allow user-assisted remote attackers to execute arbitrary code via a FAT image that contains long directory names in a deeply nested directory structure, which triggers (1) a stack-based buffer overflow during extraction, or (2) a heap-based buffer overflow during traversal.
Configurations

Configuration 1 (hide)

cpe:2.3:a:winimage:winimage:8.0.8000:*:*:*:*:*:*:*

History

21 Nov 2024, 00:31

Type Values Removed Values Added
References () http://osvdb.org/36081 - () http://osvdb.org/36081 -
References () http://osvdb.org/36082 - () http://osvdb.org/36082 -
References () http://secunia.com/advisories/25277 - Vendor Advisory () http://secunia.com/advisories/25277 - Vendor Advisory
References () http://vuln.sg/winimage808000-en.html - () http://vuln.sg/winimage808000-en.html -
References () http://www.securityfocus.com/bid/24026 - () http://www.securityfocus.com/bid/24026 -
References () http://www.vupen.com/english/advisories/2007/1854 - () http://www.vupen.com/english/advisories/2007/1854 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/34359 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/34359 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/34360 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/34360 -

Information

Published : 2007-05-18 22:30

Updated : 2024-11-21 00:31


NVD link : CVE-2007-2758

Mitre link : CVE-2007-2758

CVE.ORG link : CVE-2007-2758


JSON object : View

Products Affected

winimage

  • winimage