Vulnerability Details : CVE-2007-6697
Potential exploit
Buffer overflow in the LWZReadByte function in IMG_gif.c in SDL_image before 1.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, a similar issue to CVE-2006-4484. NOTE: some of these details are obtained from third party information.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2007-6697
- cpe:2.3:a:sdl:sdl_image:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-6697
12.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-6697
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2007-6697
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-6697
-
http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/CHANGES?revision=3462&view=markup
Simple DirectMedia LayerPatch
-
http://www.securityfocus.com/archive/1/488079/100/0/threaded
-
http://wiki.rpath.com/Advisories:rPSA-2008-0061
-
http://www.ubuntu.com/usn/usn-595-1
USN-595-1: SDL_image vulnerabilities | Ubuntu security notices | Ubuntu
-
https://issues.rpath.com/browse/RPL-2206
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/39865
SDL_Image GIF file buffer overflow CVE-2007-6697 Vulnerability Report
-
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00039.html
[SECURITY] Fedora 7 Update: SDL_image-1.2.5-7.fc7
-
http://www.gentoo.org/security/en/glsa/glsa-200802-01.xml
SDL_image: Two buffer overflow vulnerabilities (GLSA 200802-01) — Gentoo security
-
http://marc.info/?l=bugtraq&m=120110205511630&w=2
'SDL_Image 1.2.6 and prior GIF handling buffer overflow' - MARCExploit
-
http://vexillium.org/?sec-sdlgif
Exploit
-
http://bugs.gentoo.org/show_bug.cgi?id=207933
207933 – (CVE-2007-6697) media-libs/sdl-image-1.2.6: two Buffer overflows LWZReadByte() and IMG_LoadLBM_RW() (CVE-2007-6697, CVE-2008-0544)
-
http://www.debian.org/security/2008/dsa-1493
[SECURITY] [DSA 1493-1] New sdl-image1.2 packages fix arbitrary code execution
-
http://www.vupen.com/english/advisories/2008/0266
Site en construction
-
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00008.html
[SECURITY] Fedora 8 Update: SDL_image-1.2.6-5.fc8
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:040
Mandriva
-
http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_gif.c?r1=2970&r2=3462
Simple DirectMedia LayerExploit
-
http://www.securityfocus.com/bid/27417
Jump to