Vulnerability Details : CVE-2007-5378
Buffer overflow in the FileReadGIF function in tkImgGIF.c for Tk Toolkit 8.4.12 and earlier, and 8.3.5 and earlier, allows user-assisted attackers to cause a denial of service (segmentation fault) via an animated GIF in which the first subimage is smaller than a subsequent subimage, which triggers the overflow in the ReadImage function, a different vulnerability than CVE-2007-5137.
Vulnerability category: OverflowMemory CorruptionDenial of service
Products affected by CVE-2007-5378
- cpe:2.3:a:tcl_tk:tk_toolkit:*:*:*:*:*:*:*:*
- cpe:2.3:a:tcl_tk:tk_toolkit:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-5378
3.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-5378
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2007-5378
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-5378
-
Red Hat 2007-10-16Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5378 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.
References for CVE-2007-5378
-
http://www.debian.org/security/2007/dsa-1416
[SECURITY] [DSA 1416-1] New tk8.3 packages fix arbitrary code execution
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-237465-1
-
http://www.vmware.com/security/advisories/VMSA-2008-0009.html
VMSA-2008-0009.2
-
http://www.securityfocus.com/archive/1/493080/100/0/threaded
-
http://www.vupen.com/english/advisories/2008/1456/references
Site en construction
-
http://www.vupen.com/english/advisories/2008/1744
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://www.securityfocus.com/bid/26056
-
http://www.debian.org/security/2007/dsa-1415
[SECURITY] [DSA 1415-1] New tk8.4 packages fix arbitrary code execution
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:200
Mandriva
-
http://www.attrition.org/pipermail/vim/2007-October/001826.html
[VIM] clarification on multiple Tk overflow issues
-
http://www.redhat.com/support/errata/RHSA-2008-0135.html
Support
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/37189
Tk Toolkit FileReadGIF denial of service CVE-2007-5378 Vulnerability Report
-
http://www.debian.org/security/2009/dsa-1743
[SECURITY] [DSA 1743-1] New libtk-img packages fix arbitrary code execution
-
https://sourceforge.net/tracker/?func=detail&atid=112997&aid=1458234&group_id=12997
Tk Toolkit / Read-Only Bugs / #2043 Segmentation fault when using animated GIFs
-
http://www.ubuntu.com/usn/usn-529-1
USN-529-1: Tk vulnerability | Ubuntu security notices | Ubuntu
-
http://www.redhat.com/support/errata/RHSA-2008-0134.html
Support
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9480
404 Not Found
Jump to