Vulnerability Name: CVE-2007-2356 (CCN-33911) Assigned: 2007-04-27 Published: 2007-04-27 Updated: 2022-02-07 Summary: Stack-based buffer overflow in the set_color_table function in sunras.c in the SUNRAS plugin in Gimp 2.2.14 allows user-assisted remote attackers to execute arbitrary code via a crafted RAS file. CVSS v3 Severity: 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P )4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-787 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2007-2356 Source: SUSE Type: Third Party AdvisorySUSE-SR:2007:011 Source: CCN Type: RHSA-2007-0343Moderate: gimp security update Source: CCN Type: SA25012Gimp SUNRAS Plugin "set_color_table()" Buffer Overflow Source: SECUNIA Type: Broken Link25012 Source: SECUNIA Type: Broken Link25111 Source: SECUNIA Type: Broken Link25167 Source: SECUNIA Type: Broken Link25239 Source: SECUNIA Type: Broken Link25346 Source: SECUNIA Type: Broken Link25359 Source: SECUNIA Type: Broken Link25466 Source: SECUNIA Type: Broken Link25573 Source: CCN Type: SA28114Sun Solaris Gimp Multiple Vulnerabilities Source: SECUNIA Type: Broken Link28114 Source: GENTOO Type: Third Party AdvisoryGLSA-200705-08 Source: CCN Type: SECTRACK ID: 1018092GIMP Buffer Overflow in Processing Sun RAS Files Lets Remote Users Execute Arbitrary Code Source: SUNALERT Type: Broken Link, Third Party Advisory103170 Source: SUNALERT Type: Broken Link, Third Party Advisory201320 Source: CCN Type: Sun Alert ID: 103170Multiple Security Vulnerabilities Within the GIMP Plugins Source: CCN Type: ASA-2007-200GIMP security update (RHSA-2007-0343) Source: CCN Type: ASA-2008-011Multiple Security Vulnerabilities Within the GIMP Plugins (Sun 103170) Source: CCN Type: NORTEL BULLETIN ID: 2008009107, Rev 1Nortel Response to Sun Alert 201320 - Multiple Security Vulnerabilities Within the GIMP Plugins Source: DEBIAN Type: Patch, Third Party AdvisoryDSA-1301 Source: DEBIAN Type: DSA-1301gimp -- buffer overflow Source: CCN Type: GLSA-200705-08GIMP: Buffer overflow Source: CCN Type: GIMP Web siteGIMP - Downloads Source: MANDRIVA Type: Broken LinkMDKSA-2007:108 Source: REDHAT Type: Patch, Third Party AdvisoryRHSA-2007:0343 Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20070430 FLEA-2007-0015-1: gimp Source: BID Type: Exploit, Patch, Third Party Advisory, VDB Entry23680 Source: CCN Type: BID-23680GIMP RAS File Buffer Overflow Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry1018092 Source: CCN Type: TLSA-2007-34Buffer overflow Source: CCN Type: USN-467-1Gimp vulnerability Source: UBUNTU Type: Third Party AdvisoryUSN-467-1 Source: VUPEN Type: Broken Link, Vendor AdvisoryADV-2007-1560 Source: VUPEN Type: Broken Link, Vendor AdvisoryADV-2007-4241 Source: CONFIRM Type: Issue Tracking, Third Party Advisoryhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238422 Source: XF Type: Third Party Advisory, VDB Entrygimp-sunras-plugin-bo(33911) Source: XF Type: UNKNOWNgimp-sunras-plugin-bo(33911) Source: CONFIRM Type: Broken Linkhttps://issues.rpath.com/browse/RPL-1318 Source: OVAL Type: Tool Signatureoval:org.mitre.oval:def:10054 Source: OVAL Type: Tool Signatureoval:org.mitre.oval:def:5960 Source: SUSE Type: SUSE-SR:2007:011SUSE Security Summary Report Vulnerable Configuration: Configuration 1 :cpe:/a:gimp:gimp:2.2.14:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 9 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:gimp:gimp:2.2.14:*:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:sun:solaris:9::x86:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:* OR cpe:/o:sun:solaris:10::x86:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:* OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4.5.z::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4.5.z::es:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
gimp gimp 2.2.14
gimp gimp 2.2.14
gentoo linux *
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
sun solaris 9
redhat enterprise linux 3
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
sun solaris 10
sun solaris 10
redhat linux advanced workstation 2.1
canonical ubuntu 6.06
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 3.0
turbolinux turbolinux fuji
turbolinux turbolinux personal *
turbolinux turbolinux home *
turbolinux turbolinux multimedia *
redhat enterprise linux desktop 5.0
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2007.1
mandrakesoft mandrake linux 2008.0
debian debian linux 4.0
canonical ubuntu 7.04
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2007.1
redhat enterprise linux 4.5.z
redhat enterprise linux 4.5.z