Vulnerability Name: | CVE-2007-2356 (CCN-33911) |
Assigned: | 2007-04-27 |
Published: | 2007-04-27 |
Updated: | 2022-02-07 |
Summary: | Stack-based buffer overflow in the set_color_table function in sunras.c in the SUNRAS plugin in Gimp 2.2.14 allows user-assisted remote attackers to execute arbitrary code via a crafted RAS file. |
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P) 4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-787
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2007-2356
Source: SUSE Type: Third Party Advisory SUSE-SR:2007:011
Source: CCN Type: RHSA-2007-0343 Moderate: gimp security update
Source: CCN Type: SA25012 Gimp SUNRAS Plugin "set_color_table()" Buffer Overflow
Source: SECUNIA Type: Broken Link 25012
Source: SECUNIA Type: Broken Link 25111
Source: SECUNIA Type: Broken Link 25167
Source: SECUNIA Type: Broken Link 25239
Source: SECUNIA Type: Broken Link 25346
Source: SECUNIA Type: Broken Link 25359
Source: SECUNIA Type: Broken Link 25466
Source: SECUNIA Type: Broken Link 25573
Source: CCN Type: SA28114 Sun Solaris Gimp Multiple Vulnerabilities
Source: SECUNIA Type: Broken Link 28114
Source: GENTOO Type: Third Party Advisory GLSA-200705-08
Source: CCN Type: SECTRACK ID: 1018092 GIMP Buffer Overflow in Processing Sun RAS Files Lets Remote Users Execute Arbitrary Code
Source: SUNALERT Type: Broken Link, Third Party Advisory 103170
Source: SUNALERT Type: Broken Link, Third Party Advisory 201320
Source: CCN Type: Sun Alert ID: 103170 Multiple Security Vulnerabilities Within the GIMP Plugins
Source: CCN Type: ASA-2007-200 GIMP security update (RHSA-2007-0343)
Source: CCN Type: ASA-2008-011 Multiple Security Vulnerabilities Within the GIMP Plugins (Sun 103170)
Source: CCN Type: NORTEL BULLETIN ID: 2008009107, Rev 1 Nortel Response to Sun Alert 201320 - Multiple Security Vulnerabilities Within the GIMP Plugins
Source: DEBIAN Type: Patch, Third Party Advisory DSA-1301
Source: DEBIAN Type: DSA-1301 gimp -- buffer overflow
Source: CCN Type: GLSA-200705-08 GIMP: Buffer overflow
Source: CCN Type: GIMP Web site GIMP - Downloads
Source: MANDRIVA Type: Broken Link MDKSA-2007:108
Source: REDHAT Type: Patch, Third Party Advisory RHSA-2007:0343
Source: BUGTRAQ Type: Third Party Advisory, VDB Entry 20070430 FLEA-2007-0015-1: gimp
Source: BID Type: Exploit, Patch, Third Party Advisory, VDB Entry 23680
Source: CCN Type: BID-23680 GIMP RAS File Buffer Overflow Vulnerability
Source: SECTRACK Type: Third Party Advisory, VDB Entry 1018092
Source: CCN Type: TLSA-2007-34 Buffer overflow
Source: CCN Type: USN-467-1 Gimp vulnerability
Source: UBUNTU Type: Third Party Advisory USN-467-1
Source: VUPEN Type: Broken Link, Vendor Advisory ADV-2007-1560
Source: VUPEN Type: Broken Link, Vendor Advisory ADV-2007-4241
Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238422
Source: XF Type: Third Party Advisory, VDB Entry gimp-sunras-plugin-bo(33911)
Source: XF Type: UNKNOWN gimp-sunras-plugin-bo(33911)
Source: CONFIRM Type: Broken Link https://issues.rpath.com/browse/RPL-1318
Source: OVAL Type: Tool Signature oval:org.mitre.oval:def:10054
Source: OVAL Type: Tool Signature oval:org.mitre.oval:def:5960
Source: SUSE Type: SUSE-SR:2007:011 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration 1: cpe:/a:gimp:gimp:2.2.14:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6: cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7: cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8: cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 9: cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1: cpe:/a:gimp:gimp:2.2.14:*:*:*:*:*:*:*AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:sun:solaris:9::x86:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:*OR cpe:/o:sun:solaris:10::x86:*:*:*:*:*OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:server:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4.5.z::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4.5.z::es:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
gimp gimp 2.2.14
gimp gimp 2.2.14
gentoo linux *
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
sun solaris 9
redhat enterprise linux 3
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
sun solaris 10
sun solaris 10
redhat linux advanced workstation 2.1
canonical ubuntu 6.06
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 3.0
turbolinux turbolinux fuji
turbolinux turbolinux personal *
turbolinux turbolinux home *
turbolinux turbolinux multimedia *
redhat enterprise linux desktop 5.0
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2007.1
mandrakesoft mandrake linux 2008.0
debian debian linux 4.0
canonical ubuntu 7.04
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2007.1
redhat enterprise linux 4.5.z
redhat enterprise linux 4.5.z