Vulnerability Description
Heap-based buffer overflow in yEnc32 1.0.7.207 allows user-assisted remote attackers to execute arbitrary code via a long filename in an NTX file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yenc32 | Yenc32 | 1.0.7.207 |
References
- http://osvdb.org/36006
- http://secunia.com/advisories/25252PatchVendor Advisory
- http://securityreason.com/securityalert/2706
- http://vuln.sg/yenc32-107-en.html
- http://www.securityfocus.com/archive/1/468448/100/0/threaded
- http://www.securityfocus.com/bid/23948Patch
- http://www.vupen.com/english/advisories/2007/1787
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34271
- http://osvdb.org/36006
- http://secunia.com/advisories/25252PatchVendor Advisory
- http://securityreason.com/securityalert/2706
- http://vuln.sg/yenc32-107-en.html
- http://www.securityfocus.com/archive/1/468448/100/0/threaded
- http://www.securityfocus.com/bid/23948Patch
- http://www.vupen.com/english/advisories/2007/1787
FAQ
What is CVE-2007-2646?
CVE-2007-2646 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Heap-based buffer overflow in yEnc32 1.0.7.207 allows user-assisted remote attackers to execute arbitrary code via a long filename in an NTX file.
How severe is CVE-2007-2646?
CVE-2007-2646 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2646?
Check the references section above for vendor advisories and patch information. Affected products include: Yenc32 Yenc32.