CVE-2007-2459
Published May 2, 2007
Last updated 7 years ago
Overview
- Description
- Heap-based buffer overflow in the BMP reader (bmp.c) in Imager perl module (libimager-perl) 0.45 through 0.56 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted 8-bit/pixel compressed BMP files.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tony_cook:imager:0.44:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D5C7CF3-5865-4709-9C8E-52C66E171642" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.44_1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C2EBA3A-E39A-4568-B84C-7E2F27D9E3E5" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.45:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34213F75-A363-4282-99C6-3BE1D58EAA1E" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.45_2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD701807-DC28-436C-82C9-1EF60E2E9BF8" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.46:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3A41E84-908A-49F5-AF62-A9079DA44967" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.47:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EC22102-E019-430D-B916-68648A755C64" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.48:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "108D694E-777E-4BBD-BE06-B0091FEBD6DA" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.49:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "693E747D-B315-4272-A221-40BFEE97A2A4" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.50:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9B04F9B-1ED2-462D-9CBF-1424BB7EA801" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.51:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6F6BFC1-3831-44BE-ABF6-EBF98B09C6EB" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.52:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECAD9361-DD3F-4B6D-84F3-07EC7F6B4D9E" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.53:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1E4C0A0-89C0-42DC-A722-BE7698F595E4" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.54:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2074080-1D18-4EC4-9DF1-DB82EB28A508" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.55:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E413A2B-2F3D-4B16-9C79-356828586DD8" }, { "criteria": "cpe:2.3:a:tony_cook:imager:0.56:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1728224-E2AA-452D-8DAD-E6B4DE9B912D" } ], "operator": "OR" } ] } ]