CVE-2007-1797
Published Apr 2, 2007
Last updated 7 years ago
Overview
- Description
- Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-189
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A67EC834-E5DA-4B2A-B367-E59E9CA90CB1" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BDE29F9-EE0A-4515-AF2A-9EB0446B2D47" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1FD5DCA-BAE9-47CB-BF31-F04FFA501B30" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E72CD58D-BEE3-4648-9C52-B60683965709" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16A1E728-9D17-47AC-A4E0-F33E00F9C6EE" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "780EF8D0-A3ED-49D8-92B8-C62BD4FA26E7" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E0B22AE-4C98-4375-8AEE-3E74B8E4812E" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "506C2BA5-7E5C-4691-99E2-2071552877B8" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C99BF5A1-55C3-4406-BE0C-E2583FB27017" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDF952A1-AE69-4936-BBA6-8B2F6256A0D8" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "710C4C5B-BEE4-4E7A-AC1A-51EF404B27C1" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "763E4543-93AD-4860-A118-F8D1D5A1736F" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3B8CD6E-8DA5-4BA4-AE31-5F0288D6F478" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CFC49A6-9DF5-4C89-A2D3-1F6C0A73C1EB" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD097402-65AC-4D8B-94AC-B298E9B0327C" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89F1E5F1-71D4-4B32-A073-6D41653BA140" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8DB9368-67E0-4EEE-8F4B-950AA5B37B29" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3115E096-86FD-4225-A580-6E4670DD170F" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "069ADDAE-6CD4-4A0C-969D-2181E30F071C" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92F14D1C-F403-4F04-903E-3F4502C6193C" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D9337EF-2A41-4AC4-86D8-AC08C17617BA" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43A84112-81B0-4867-85F1-A19296D65AC0" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26DCFB60-A979-4683-84A0-1C71C0E9241E" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "470014AC-02A7-4332-BE7D-DF012E9E29F7" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E6189E9-D6FA-4B16-A09A-E7B8C74984A6" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9D90D96-14AB-40FC-8ADE-07DBB77F4975" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "365BD82F-FE74-4044-8464-A35B4E971D27" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AB4627D-79E3-442B-8768-02159C76BA74" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75F656CD-B9FE-45ED-AA31-574BA346D50B" }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDC51A7C-60BD-4995-921B-01889EC56CEE" } ], "operator": "OR" } ] } ]