Vulnerability Details : CVE-2007-1215
Buffer overflow in the Graphics Device Interface (GDI) in Microsoft Windows 2000 SP4; XP SP2; Server 2003 Gold, SP1, and SP2; and Vista allows local users to gain privileges via certain "color-related parameters" in crafted images.
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2007-1215
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 8 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-1215
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
[email protected] |
References for CVE-2007-1215
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1927
- http://www.vupen.com/english/advisories/2007/1215
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017
-
http://www.securitytracker.com/id?1017847
- http://www.securityfocus.com/archive/1/466186/100/200/threaded
-
http://www.securityfocus.com/bid/23273
Products affected by CVE-2007-1215
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:gold:professional_x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:gold:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:gold:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:gold:*:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:sp2:*:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*