Vulnerability Name:

CVE-2007-2356 (CCN-33911)

Assigned:2007-04-27
Published:2007-04-27
Updated:2022-02-07
Summary:Stack-based buffer overflow in the set_color_table function in sunras.c in the SUNRAS plugin in Gimp 2.2.14 allows user-assisted remote attackers to execute arbitrary code via a crafted RAS file.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-2356

Source: SUSE
Type: Third Party Advisory
SUSE-SR:2007:011

Source: CCN
Type: RHSA-2007-0343
Moderate: gimp security update

Source: CCN
Type: SA25012
Gimp SUNRAS Plugin "set_color_table()" Buffer Overflow

Source: SECUNIA
Type: Broken Link
25012

Source: SECUNIA
Type: Broken Link
25111

Source: SECUNIA
Type: Broken Link
25167

Source: SECUNIA
Type: Broken Link
25239

Source: SECUNIA
Type: Broken Link
25346

Source: SECUNIA
Type: Broken Link
25359

Source: SECUNIA
Type: Broken Link
25466

Source: SECUNIA
Type: Broken Link
25573

Source: CCN
Type: SA28114
Sun Solaris Gimp Multiple Vulnerabilities

Source: SECUNIA
Type: Broken Link
28114

Source: GENTOO
Type: Third Party Advisory
GLSA-200705-08

Source: CCN
Type: SECTRACK ID: 1018092
GIMP Buffer Overflow in Processing Sun RAS Files Lets Remote Users Execute Arbitrary Code

Source: SUNALERT
Type: Broken Link, Third Party Advisory
103170

Source: SUNALERT
Type: Broken Link, Third Party Advisory
201320

Source: CCN
Type: Sun Alert ID: 103170
Multiple Security Vulnerabilities Within the GIMP Plugins

Source: CCN
Type: ASA-2007-200
GIMP security update (RHSA-2007-0343)

Source: CCN
Type: ASA-2008-011
Multiple Security Vulnerabilities Within the GIMP Plugins (Sun 103170)

Source: CCN
Type: NORTEL BULLETIN ID: 2008009107, Rev 1
Nortel Response to Sun Alert 201320 - Multiple Security Vulnerabilities Within the GIMP Plugins

Source: DEBIAN
Type: Patch, Third Party Advisory
DSA-1301

Source: DEBIAN
Type: DSA-1301
gimp -- buffer overflow

Source: CCN
Type: GLSA-200705-08
GIMP: Buffer overflow

Source: CCN
Type: GIMP Web site
GIMP - Downloads

Source: MANDRIVA
Type: Broken Link
MDKSA-2007:108

Source: REDHAT
Type: Patch, Third Party Advisory
RHSA-2007:0343

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20070430 FLEA-2007-0015-1: gimp

Source: BID
Type: Exploit, Patch, Third Party Advisory, VDB Entry
23680

Source: CCN
Type: BID-23680
GIMP RAS File Buffer Overflow Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1018092

Source: CCN
Type: TLSA-2007-34
Buffer overflow

Source: CCN
Type: USN-467-1
Gimp vulnerability

Source: UBUNTU
Type: Third Party Advisory
USN-467-1

Source: VUPEN
Type: Broken Link, Vendor Advisory
ADV-2007-1560

Source: VUPEN
Type: Broken Link, Vendor Advisory
ADV-2007-4241

Source: CONFIRM
Type: Issue Tracking, Third Party Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238422

Source: XF
Type: Third Party Advisory, VDB Entry
gimp-sunras-plugin-bo(33911)

Source: XF
Type: UNKNOWN
gimp-sunras-plugin-bo(33911)

Source: CONFIRM
Type: Broken Link
https://issues.rpath.com/browse/RPL-1318

Source: OVAL
Type: Tool Signature
oval:org.mitre.oval:def:10054

Source: OVAL
Type: Tool Signature
oval:org.mitre.oval:def:5960

Source: SUSE
Type: SUSE-SR:2007:011
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gimp:gimp:2.2.14:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gimp:gimp:2.2.14:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::x86:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::x86:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::es:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20072356
    V
    CVE-2007-2356
    2022-06-30
    oval:org.opensuse.security:def:112292
    P
    gimp-2.10.24-3.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:26164
    P
    Security update for MozillaFirefox (Important)
    2021-11-17
    oval:org.opensuse.security:def:105815
    P
    gimp-2.10.24-3.1 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:36411
    P
    gimp-2.6.2-3.34.45.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:26036
    P
    Security update for MozillaFirefox (Important)
    2021-04-27
    oval:org.opensuse.security:def:25972
    P
    Security update for postgresql12 (Important)
    2020-12-04
    oval:org.opensuse.security:def:27374
    P
    bind-devel-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26386
    P
    Security update for kdepim, messagelib (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25960
    P
    Security update for gimp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26678
    P
    coolkey on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27409
    P
    gimp on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26537
    P
    dhcp on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25961
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:26692
    P
    evince on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26245
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26590
    P
    libmusicbrainz4 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26736
    P
    libQtWebKit4-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26302
    P
    Security update for python-PyYAML (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26639
    P
    star on GA media (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:20465
    P
    DSA-1301-1 gimp
    2014-06-23
    oval:org.mitre.oval:def:21752
    P
    ELSA-2007:0343: gimp security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:10054
    V
    Stack-based buffer overflow in the set_color_table function in sunras.c in the SUNRAS plugin in Gimp 2.2.14 allows user-assisted remote attackers to execute arbitrary code via a crafted RAS file.
    2013-04-29
    oval:org.mitre.oval:def:5960
    V
    SUNRAS Plugin of Gimp Vulnerability
    2008-10-20
    oval:org.debian:def:1301
    V
    buffer overflow
    2007-06-09
    oval:com.redhat.rhsa:def:20070343
    P
    RHSA-2007:0343: gimp security update (Moderate)
    2007-05-21
    BACK
    gimp gimp 2.2.14
    gimp gimp 2.2.14
    gentoo linux *
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    sun solaris 9
    redhat enterprise linux 3
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    sun solaris 10
    sun solaris 10
    redhat linux advanced workstation 2.1
    canonical ubuntu 6.06
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 3.0
    turbolinux turbolinux fuji
    turbolinux turbolinux personal *
    turbolinux turbolinux home *
    turbolinux turbolinux multimedia *
    redhat enterprise linux desktop 5.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    redhat enterprise linux 4.5.z
    redhat enterprise linux 4.5.z