Vulnerability Name: | CVE-2009-2660 (CCN-52649) | ||||||||||||||||||||||||||||
Assigned: | 2009-08-04 | ||||||||||||||||||||||||||||
Published: | 2009-08-04 | ||||||||||||||||||||||||||||
Updated: | 2017-08-17 | ||||||||||||||||||||||||||||
Summary: | Multiple integer overflows in CamlImages 2.2 might allow context-dependent attackers to execute arbitrary code via images containing large width and height values that trigger a heap-based buffer overflow, related to (1) crafted GIF files (gifread.c) and (2) crafted JPEG files (jpegread.c), a different vulnerability than CVE-2009-2295. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-189 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: CONFIRM Type: UNKNOWN ftp://ftp.debian.org/debian/pool/main/c/camlimages/camlimages_2.2.0-4+lenny2.diff.gz Source: CONFIRM Type: UNKNOWN ftp://ftp.debian.org/debian/pool/main/c/camlimages/camlimages_2.20-8+etch2.diff.gz Source: CONFIRM Type: UNKNOWN ftp://ftp.debian.org/debian/pool/main/c/camlimages/camlimages_3.0.1-3.diff.gz Source: CONFIRM Type: UNKNOWN http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540146 Source: CONFIRM Type: UNKNOWN http://camlcvs.inria.fr/cgi-bin/cvsweb.cgi/bazar-ocaml/camlimages/src/jpegread.c.diff?r1=1.3;r2=1.4;sortby=date;f=h Source: MITRE Type: CNA CVE-2009-2660 Source: CCN Type: CamlImages Web site CamlImages Source: SECUNIA Type: UNKNOWN 37067 Source: CONFIRM Type: UNKNOWN http://security.debian.org/pool/updates/main/c/camlimages/camlimages_2.2.0-4+lenny3.diff.gz Source: CONFIRM Type: UNKNOWN http://security.debian.org/pool/updates/main/c/camlimages/camlimages_2.20-8+etch3.diff.gz Source: DEBIAN Type: UNKNOWN DSA-1857 Source: DEBIAN Type: UNKNOWN DSA-1912 Source: DEBIAN Type: DSA-1857 camlimages -- integer overflow Source: DEBIAN Type: DSA-1912 camlimages -- integer overflow Source: CCN Type: GLSA-201006-02 CamlImages: User-assisted execution of arbitrary code Source: MLIST Type: UNKNOWN [oss-security] 20090725 camlimages: Integer overflows in GIF and JPEG readers Source: BID Type: UNKNOWN 35999 Source: CCN Type: BID-35999 CamlImages Image Parsing Multiple Heap Overflow Vulnerabilities Source: CONFIRM Type: Exploit https://bugs.gentoo.org/attachment.cgi?id=199108 Source: CCN Type: Gentoo Bugzilla Bug 276235 camlimages-3.0.1 integer overflows Source: CONFIRM Type: UNKNOWN https://bugs.gentoo.org/show_bug.cgi?id=276235 Source: XF Type: UNKNOWN camlimages-gifread-jpegread-bo(52649) Source: XF Type: UNKNOWN camlimages-gifread-jpegread-bo(52649) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |