CVE-2007-0619
Gentoo Linux Security Advisory 200702-12
Severity Score
8.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
chmlib before 0.39 allows user-assisted remote attackers to execute arbitrary code via a crafted page block length in a CHM file, which triggers memory corruption.
chmlib anterior a la 0.39 permite a atacantes con la intervención del usuario ejecutar código de su elección mediante la manipulación de un largo bloque de una página en el fichero CHM, lo que dispara una corrupción de memoria.
When certain CHM files that contain tables and objects stored in pages are parsed by CHMlib, an unsanitized value is passed to the alloca() function resulting in a shift of the stack pointer to arbitrary memory locations. Versions less than 0.39 are affected.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-01-30 CVE Reserved
- 2007-01-31 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=468 | Third Party Advisory | |
http://secunia.com/advisories/24335 | Third Party Advisory | |
http://securitytracker.com/id?1017565 | Vdb Entry | |
http://www.securityfocus.com/bid/22258 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/0361 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://morte.jedrea.com/~jedwin/projects/chmlib | 2011-03-08 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/23975 | 2011-03-08 | |
http://security.gentoo.org/glsa/glsa-200702-12.xml | 2011-03-08 | |
http://www.novell.com/linux/security/advisories/2007_3_sr.html | 2011-03-08 |