Vulnerability Details : CVE-2004-0817
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
Vulnerability category: Execute code
Products affected by CVE-2004-0817
- cpe:2.3:a:sun:java_desktop_system:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:java_desktop_system:2003:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
- cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.11:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.10:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.12:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.13:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib:1.9.14:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib2:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib2:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib2:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib2:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib2:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib2:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib2:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:enlightenment:imlib2:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0817
7.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0817
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2004-0817
-
http://www.redhat.com/support/errata/RHSA-2004-465.html
Patch;Vendor Advisory
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870
CONECTIVA | Análises dos Melhores Produtos Online (#10 Melhores)Patch
-
http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml
ImageMagick, imlib, imlib2: BMP decoding buffer overflows (GLSA 200409-12) — Gentoo securityPatch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843
-
http://www.securityfocus.com/bid/11084
Patch
-
http://www.mandriva.com/security/advisories?name=MDKSA-2004:089
-
http://www.debian.org/security/2004/dsa-548
Patch;Vendor Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17182
Jump to