CVE-2007-6697

Buffer overflow in the LWZReadByte function in IMG_gif.c in SDL_image before 1.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, a similar issue to CVE-2006-4484. NOTE: some of these details are obtained from third party information.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=207933
http://marc.info/?l=bugtraq&m=120110205511630&w=2 Exploit
http://secunia.com/advisories/28640 Vendor Advisory
http://secunia.com/advisories/28752
http://secunia.com/advisories/28830
http://secunia.com/advisories/28837
http://secunia.com/advisories/28850
http://secunia.com/advisories/28869
http://secunia.com/advisories/29542
http://vexillium.org/?sec-sdlgif Exploit
http://wiki.rpath.com/Advisories:rPSA-2008-0061
http://www.debian.org/security/2008/dsa-1493
http://www.gentoo.org/security/en/glsa/glsa-200802-01.xml
http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/CHANGES?revision=3462&view=markup Patch
http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_gif.c?r1=2970&r2=3462 Exploit
http://www.mandriva.com/security/advisories?name=MDVSA-2008:040
http://www.securityfocus.com/archive/1/488079/100/0/threaded
http://www.securityfocus.com/bid/27417
http://www.ubuntu.com/usn/usn-595-1
http://www.vupen.com/english/advisories/2008/0266
https://exchange.xforce.ibmcloud.com/vulnerabilities/39865
https://issues.rpath.com/browse/RPL-2206
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00008.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00039.html
http://bugs.gentoo.org/show_bug.cgi?id=207933
http://marc.info/?l=bugtraq&m=120110205511630&w=2 Exploit
http://secunia.com/advisories/28640 Vendor Advisory
http://secunia.com/advisories/28752
http://secunia.com/advisories/28830
http://secunia.com/advisories/28837
http://secunia.com/advisories/28850
http://secunia.com/advisories/28869
http://secunia.com/advisories/29542
http://vexillium.org/?sec-sdlgif Exploit
http://wiki.rpath.com/Advisories:rPSA-2008-0061
http://www.debian.org/security/2008/dsa-1493
http://www.gentoo.org/security/en/glsa/glsa-200802-01.xml
http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/CHANGES?revision=3462&view=markup Patch
http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_gif.c?r1=2970&r2=3462 Exploit
http://www.mandriva.com/security/advisories?name=MDVSA-2008:040
http://www.securityfocus.com/archive/1/488079/100/0/threaded
http://www.securityfocus.com/bid/27417
http://www.ubuntu.com/usn/usn-595-1
http://www.vupen.com/english/advisories/2008/0266
https://exchange.xforce.ibmcloud.com/vulnerabilities/39865
https://issues.rpath.com/browse/RPL-2206
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00008.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00039.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:sdl:sdl_image:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:40

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=207933 - () http://bugs.gentoo.org/show_bug.cgi?id=207933 -
References () http://marc.info/?l=bugtraq&m=120110205511630&w=2 - Exploit () http://marc.info/?l=bugtraq&m=120110205511630&w=2 - Exploit
References () http://secunia.com/advisories/28640 - Vendor Advisory () http://secunia.com/advisories/28640 - Vendor Advisory
References () http://secunia.com/advisories/28752 - () http://secunia.com/advisories/28752 -
References () http://secunia.com/advisories/28830 - () http://secunia.com/advisories/28830 -
References () http://secunia.com/advisories/28837 - () http://secunia.com/advisories/28837 -
References () http://secunia.com/advisories/28850 - () http://secunia.com/advisories/28850 -
References () http://secunia.com/advisories/28869 - () http://secunia.com/advisories/28869 -
References () http://secunia.com/advisories/29542 - () http://secunia.com/advisories/29542 -
References () http://vexillium.org/?sec-sdlgif - Exploit () http://vexillium.org/?sec-sdlgif - Exploit
References () http://wiki.rpath.com/Advisories:rPSA-2008-0061 - () http://wiki.rpath.com/Advisories:rPSA-2008-0061 -
References () http://www.debian.org/security/2008/dsa-1493 - () http://www.debian.org/security/2008/dsa-1493 -
References () http://www.gentoo.org/security/en/glsa/glsa-200802-01.xml - () http://www.gentoo.org/security/en/glsa/glsa-200802-01.xml -
References () http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/CHANGES?revision=3462&view=markup - Patch () http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/CHANGES?revision=3462&view=markup - Patch
References () http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_gif.c?r1=2970&r2=3462 - Exploit () http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_gif.c?r1=2970&r2=3462 - Exploit
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:040 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:040 -
References () http://www.securityfocus.com/archive/1/488079/100/0/threaded - () http://www.securityfocus.com/archive/1/488079/100/0/threaded -
References () http://www.securityfocus.com/bid/27417 - () http://www.securityfocus.com/bid/27417 -
References () http://www.ubuntu.com/usn/usn-595-1 - () http://www.ubuntu.com/usn/usn-595-1 -
References () http://www.vupen.com/english/advisories/2008/0266 - () http://www.vupen.com/english/advisories/2008/0266 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/39865 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/39865 -
References () https://issues.rpath.com/browse/RPL-2206 - () https://issues.rpath.com/browse/RPL-2206 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00008.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00008.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00039.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00039.html -

Information

Published : 2008-02-01 20:00

Updated : 2024-11-21 00:40


NVD link : CVE-2007-6697

Mitre link : CVE-2007-6697

CVE.ORG link : CVE-2007-6697


JSON object : View

Products Affected

sdl

  • sdl_image
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer