// For flags

CVE-2007-4965

Python 2.2 ImageOP Module - Multiple Integer Overflow Vulnerabilities

Severity Score

5.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.

Múltiples desbordamientos de entero en el módulo imageop de Python 2.5.1 y anteriores permiten a atacantes locales o remotos (dependiendo del contexto) provocar una denegación de servicio (caída de aplicación) y posiblemente obtener información sensible (contenidos de memoria) mediante argumentos manipulados para (1) el método tovideo, y otros vectores no especificados relacionados con (2) imageop.c, (3) rbgimgmodule.c, y otros archivos, que disparan desbordamientos de búfer basado en montículo.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-09-17 First Exploit
  • 2007-09-18 CVE Reserved
  • 2007-09-18 CVE Published
  • 2024-07-22 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-190: Integer Overflow or Wraparound
CAPEC
References (52)
URL Tag Source
http://bugs.gentoo.org/show_bug.cgi?id=192876 Third Party Advisory
http://docs.info.apple.com/article.html?artnum=307179 Third Party Advisory
http://lists.vmware.com/pipermail/security-announce/2008/000005.html Mailing List
http://secunia.com/advisories/26837 Broken Link
http://secunia.com/advisories/27460 Broken Link
http://secunia.com/advisories/27562 Broken Link
http://secunia.com/advisories/27872 Broken Link
http://secunia.com/advisories/28136 Broken Link
http://secunia.com/advisories/28480 Broken Link
http://secunia.com/advisories/28838 Broken Link
http://secunia.com/advisories/29032 Broken Link
http://secunia.com/advisories/29303 Broken Link
http://secunia.com/advisories/29889 Broken Link
http://secunia.com/advisories/31255 Broken Link
http://secunia.com/advisories/31492 Broken Link
http://secunia.com/advisories/33937 Broken Link
http://secunia.com/advisories/37471 Broken Link
http://secunia.com/advisories/38675 Broken Link
http://support.apple.com/kb/HT3438 Third Party Advisory
http://support.avaya.com/css/P8/documents/100074697 Third Party Advisory
http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254 Third Party Advisory
http://www.securityfocus.com/archive/1/487990/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/488457/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/507985/100/0/threaded Mailing List
http://www.us-cert.gov/cas/techalerts/TA07-352A.html Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
http://www.vupen.com/english/advisories/2007/3201 Broken Link
http://www.vupen.com/english/advisories/2007/4238 Broken Link
http://www.vupen.com/english/advisories/2008/0637 Broken Link
http://www.vupen.com/english/advisories/2009/3316 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/36653 Vdb Entry
https://issues.rpath.com/browse/RPL-1885 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496 Broken Link
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
<= 2.5.1
Search vendor "Python" for product "Python" and version " <= 2.5.1"
-
Affected