CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
94.5%
Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.
Vendor | Product | Version | CPE |
---|---|---|---|
x.org | libx11 | * | cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:* |
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 6.06 | cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 6.10 | cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 7.04 | cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
issues.foresightlinux.org/browse/FL-223
lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
rhn.redhat.com/errata/RHSA-2007-0125.html
secunia.com/advisories/24739
secunia.com/advisories/24741
secunia.com/advisories/24745
secunia.com/advisories/24756
secunia.com/advisories/24758
secunia.com/advisories/24765
secunia.com/advisories/24771
secunia.com/advisories/24791
secunia.com/advisories/24953
secunia.com/advisories/24975
secunia.com/advisories/25004
secunia.com/advisories/25072
secunia.com/advisories/25112
secunia.com/advisories/25131
secunia.com/advisories/25305
secunia.com/advisories/25992
secunia.com/advisories/26177
secunia.com/advisories/30161
secunia.com/advisories/33937
secunia.com/advisories/36260
security.gentoo.org/glsa/glsa-200705-06.xml
sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1
support.apple.com/kb/HT3438
support.avaya.com/elmodocs2/security/ASA-2007-176.htm
www.debian.org/security/2007/dsa-1294
www.debian.org/security/2009/dsa-1858
www.gentoo.org/security/en/glsa/glsa-200805-07.xml
www.mandriva.com/security/advisories?name=MDKSA-2007:079
www.mandriva.com/security/advisories?name=MDKSA-2007:147
www.novell.com/linux/security/advisories/2007_27_x.html
www.novell.com/linux/security/advisories/2007_8_sr.html
www.openbsd.org/errata39.html#021_xorg
www.openbsd.org/errata40.html#011_xorg
www.redhat.com/support/errata/RHSA-2007-0126.html
www.redhat.com/support/errata/RHSA-2007-0157.html
www.securityfocus.com/archive/1/464686/100/0/threaded
www.securityfocus.com/archive/1/464816/100/0/threaded
www.securityfocus.com/bid/23300
www.securitytracker.com/id?1017864
www.ubuntu.com/usn/usn-453-1
www.ubuntu.com/usn/usn-453-2
www.ubuntu.com/usn/usn-481-1
www.vupen.com/english/advisories/2007/1217
www.vupen.com/english/advisories/2007/1531
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684
issues.rpath.com/browse/RPL-1211
issues.rpath.com/browse/RPL-1213
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776