Vulnerability Description
Multiple buffer overflows in the LizardTech DjVu Browser Plug-in before 6.1.1 allow remote attackers to execute arbitrary code via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lizardtech | Djvu Browser Plug-In | 6.0 |
References
- http://osvdb.org/33199
- http://secunia.com/advisories/24149PatchVendor Advisory
- http://securityreason.com/securityalert/2259
- http://www.kb.cert.org/vuls/id/522393PatchUS Government Resource
- http://www.lizardtech.com/products/doc/djvupluginrelease.php
- http://www.securityfocus.com/archive/1/460197/100/0/threaded
- http://www.securityfocus.com/bid/22569Patch
- http://www.vupen.com/english/advisories/2007/0618
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32510
- http://osvdb.org/33199
- http://secunia.com/advisories/24149PatchVendor Advisory
- http://securityreason.com/securityalert/2259
- http://www.kb.cert.org/vuls/id/522393PatchUS Government Resource
- http://www.lizardtech.com/products/doc/djvupluginrelease.php
- http://www.securityfocus.com/archive/1/460197/100/0/threaded
FAQ
What is CVE-2007-0324?
CVE-2007-0324 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple buffer overflows in the LizardTech DjVu Browser Plug-in before 6.1.1 allow remote attackers to execute arbitrary code via unspecified vectors.
How severe is CVE-2007-0324?
CVE-2007-0324 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-0324?
Check the references section above for vendor advisories and patch information. Affected products include: Lizardtech Djvu Browser Plug-In.