Vulnerability Name:

CVE-2007-6725 (CCN-49626)

Assigned:2007-02-19
Published:2007-02-19
Updated:2018-10-15
Summary:The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
4.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2007-6725

Source: SUSE
Type: UNKNOWN
SUSE-SR:2009:011

Source: CCN
Type: RHSA-2009-0420
Moderate: ghostscript security update

Source: CCN
Type: RHSA-2009-0421
Moderate: ghostscript security update

Source: SECUNIA
Type: UNKNOWN
34726

Source: SECUNIA
Type: UNKNOWN
34729

Source: SECUNIA
Type: UNKNOWN
34732

Source: SECUNIA
Type: UNKNOWN
35416

Source: CCN
Type: SA35559
Sun Solaris 9 Ghostscript Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
35559

Source: CCN
Type: SA35569
Sun Solaris Ghostscript Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
35569

Source: SUNALERT
Type: UNKNOWN
262288

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2009-155.htm

Source: CCN
Type: ASA-2009-155
ghostscript security update (RHSA-2009-0420)

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/Advisories:rPSA-2009-0060

Source: DEBIAN
Type: DSA-2080
ghostscript -- several vulnerabilities

Source: CCN
Type: GhostScripter Web site
Ghostscript

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-5699

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2009:095

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2009:096

Source: MLIST
Type: UNKNOWN
[oss-security] 20090401 CVE request -- ghostscript

Source: CCN
Type: OSVDB ID: 53618
Ghostscript CCITTFax Decoding Filter cf_decode_2d Function PDF File Handling Underflow

Source: REDHAT
Type: UNKNOWN
RHSA-2009:0420

Source: REDHAT
Type: UNKNOWN
RHSA-2009:0421

Source: BUGTRAQ
Type: UNKNOWN
20090417 rPSA-2009-0060-1 ghostscript

Source: BID
Type: UNKNOWN
34337

Source: CCN
Type: BID-34337
Ghostscript 'CCITTFax' Decoding Filter Denial of Service Vulnerability

Source: CCN
Type: USN-757-1
Ghostscript vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2009-1708

Source: CONFIRM
Type: Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=229174

Source: CCN
Type: Red Hat Bugzilla Bug 493442
ghostscript - DoS (crash) in CCITTFax decoding filter

Source: CONFIRM
Type: Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=493442

Source: XF
Type: UNKNOWN
ghostscript-ccittfax-dos(49626)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9507

Source: UBUNTU
Type: UNKNOWN
USN-757-1

Source: SUSE
Type: SUSE-SR:2009:011
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ghostscript:ghostscript:8.60:*:*:*:*:*:*:*
  • OR cpe:/a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*
  • OR cpe:/a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*
  • OR cpe:/a:ghostscript:ghostscript:8.60:*:*:*:*:*:*:*
  • OR cpe:/a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*
  • OR cpe:/a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*
  • OR cpe:/a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*
  • OR cpe:/a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20076725
    V
    CVE-2007-6725
    2022-05-20
    oval:org.opensuse.security:def:32167
    P
    Security update for openssl (Important)
    2021-08-24
    oval:org.opensuse.security:def:29359
    P
    Security update for bind (Important)
    2021-05-04
    oval:org.opensuse.security:def:32260
    P
    Security update for java-1_7_1-ibm (Important)
    2021-02-18
    oval:org.opensuse.security:def:29395
    P
    Security update for openssh (Moderate)
    2021-01-05
    oval:org.opensuse.security:def:28284
    P
    Security update for mysql (Important)
    2020-12-01
    oval:org.opensuse.security:def:31959
    P
    Security update for gtk2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32704
    P
    libapr1 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28520
    P
    Security update for openssl1 (Important)
    2020-12-01
    oval:org.opensuse.security:def:27938
    P
    Security update for GraphicsMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32770
    P
    perl-Tk on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28622
    P
    Security update for xorg-x11-libxcb
    2020-12-01
    oval:org.opensuse.security:def:32317
    P
    Security update for rsync (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28013
    P
    Security update for apache2-mod_fcgid (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33447
    P
    Security update for GhostScript
    2020-12-01
    oval:org.opensuse.security:def:28677
    P
    Security update for MozillaFirefox
    2020-12-01
    oval:org.opensuse.security:def:32560
    P
    libopenssl0_9_8 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28227
    P
    Security update for libssh2_org (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31948
    P
    Security update for gpg2 (Important)
    2020-12-01
    oval:org.opensuse.security:def:32665
    P
    freetype2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28368
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32033
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:27937
    P
    Security update for GraphicsMagick (Important)
    2020-12-01
    oval:org.opensuse.security:def:32726
    P
    libpulse-browse0 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28573
    P
    Security update for libgcrypt
    2020-12-01
    oval:org.opensuse.security:def:27949
    P
    Security update for GraphicsMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33408
    P
    Security update for cobbler (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28661
    P
    Security update for file
    2020-12-01
    oval:org.opensuse.security:def:32404
    P
    Security update for w3m (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28143
    P
    Security update for java-1_7_1-ibm (Important)
    2020-12-01
    oval:org.opensuse.security:def:31947
    P
    Security update for gpg2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28721
    P
    Security update for kdirstat
    2020-12-01
    oval:org.opensuse.security:def:32616
    P
    xen on GA media (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:29276
    P
    RHSA-2009:0421 -- ghostscript security update (Moderate)
    2015-08-17
    oval:org.mitre.oval:def:12360
    P
    DSA-2080-1 ghostscript -- several
    2014-07-21
    oval:org.mitre.oval:def:13192
    P
    USN-757-1 -- ghostscript, gs-esp, gs-gpl vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:22480
    P
    ELSA-2009:0421: ghostscript security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:9507
    V
    The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.
    2013-04-29
    oval:org.debian:def:2080
    V
    several vulnerabilities
    2010-08-01
    oval:com.redhat.rhsa:def:20090420
    P
    RHSA-2009:0420: ghostscript security update (Moderate)
    2009-04-14
    oval:com.redhat.rhsa:def:20090421
    P
    RHSA-2009:0421: ghostscript security update (Moderate)
    2009-04-14
    BACK
    ghostscript ghostscript 8.60
    ghostscript ghostscript 8.61
    ghostscript ghostscript 8.15.2
    ghostscript ghostscript 8.0.1
    ghostscript ghostscript 8.61
    ghostscript ghostscript 8.60
    ghostscript ghostscript 8.57
    ghostscript ghostscript 8.56
    ghostscript ghostscript 8.54
    ghostscript ghostscript 8.15
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    canonical ubuntu 6.06
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    mandrakesoft mandrake linux 2008.1
    canonical ubuntu 8.04
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0