Vulnerability Name:

CVE-2006-0053 (CCN-25717)

Assigned:2005-12-28
Published:2006-03-29
Updated:2017-07-20
Summary:Imager (libimager-perl) before 0.50 allows user-assisted attackers to cause a denial of service (segmentation fault) by writing a 2- or 4-channel JPEG image (or a 2-channel TGA image) to a scalar, which triggers a NULL pointer dereference.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-399
Vulnerability Consequences:Denial of Service
References:Source: CONFIRM
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359661

Source: MITRE
Type: CNA
CVE-2006-0053

Source: CCN
Type: Imager Web page
Imager - News

Source: MISC
Type: UNKNOWN
http://rt.cpan.org/Public/Bug/Display.html?id=18397

Source: CCN
Type: search.cpan.org
Imager - Perl extension for Generating 24 bit Images

Source: CCN
Type: SA19575
Imager JPEG/TGA Image Processing Denial of Service

Source: SECUNIA
Type: Patch, Vendor Advisory
19575

Source: SECUNIA
Type: Patch, Vendor Advisory
19577

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-1028

Source: DEBIAN
Type: DSA-1028
libimager-perl -- programing error

Source: CCN
Type: OSVDB ID: 24512
Imager (libimager-perl) JPEG/TGA 4-channel JPEG Image Processing DoS

Source: BID
Type: Exploit, Patch
17415

Source: CCN
Type: BID-17415
Tony Cook Imager JPEG and TGA Images Denial Of Service Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2006-1294

Source: XF
Type: UNKNOWN
imager-jpeg-tga-dos(25717)

Source: XF
Type: UNKNOWN
imager-jpeg-tga-dos(25717)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:tony_cook:imager:0.41:*:*:*:*:*:*:*
  • OR cpe:/a:tony_cook:imager:0.42:*:*:*:*:*:*:*
  • OR cpe:/a:tony_cook:imager:0.43:*:*:*:*:*:*:*
  • OR cpe:/a:tony_cook:imager:0.44_1:*:*:*:*:*:*:*
  • OR cpe:/a:tony_cook:imager:0.45:*:*:*:*:*:*:*
  • OR cpe:/a:tony_cook:imager:0.45_2:*:*:*:*:*:*:*
  • OR cpe:/a:tony_cook:imager:0.47:*:*:*:*:*:*:*
  • OR cpe:/a:tony_cook:imager:0.48:*:*:*:*:*:*:*
  • OR cpe:/a:tony_cook:imager:0.49:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:1028
    V
    programming error
    2006-03-07
    BACK
    tony_cook imager 0.41
    tony_cook imager 0.42
    tony_cook imager 0.43
    tony_cook imager 0.44_1
    tony_cook imager 0.45
    tony_cook imager 0.45_2
    tony_cook imager 0.47
    tony_cook imager 0.48
    tony_cook imager 0.49