Vulnerability Description
Multiple buffer overflows in WinImage 8.0.8000 allow user-assisted remote attackers to execute arbitrary code via a FAT image that contains long directory names in a deeply nested directory structure, which triggers (1) a stack-based buffer overflow during extraction, or (2) a heap-based buffer overflow during traversal.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Winimage | Winimage | 8.0.8000 |
References
- http://osvdb.org/36081
- http://osvdb.org/36082
- http://secunia.com/advisories/25277Vendor Advisory
- http://vuln.sg/winimage808000-en.html
- http://www.securityfocus.com/bid/24026
- http://www.vupen.com/english/advisories/2007/1854
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34359
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34360
- http://osvdb.org/36081
- http://osvdb.org/36082
- http://secunia.com/advisories/25277Vendor Advisory
- http://vuln.sg/winimage808000-en.html
- http://www.securityfocus.com/bid/24026
- http://www.vupen.com/english/advisories/2007/1854
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34359
FAQ
What is CVE-2007-2758?
CVE-2007-2758 is a vulnerability with a CVSS score of 9.3 (HIGH). Multiple buffer overflows in WinImage 8.0.8000 allow user-assisted remote attackers to execute arbitrary code via a FAT image that contains long directory names in a deeply nested directory structure,...
How severe is CVE-2007-2758?
CVE-2007-2758 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2758?
Check the references section above for vendor advisories and patch information. Affected products include: Winimage Winimage.