Vulnerabilities > CVE-2007-0653 - Integer Overflow And Underflow vulnerability in X Multimedia System X Multimedia System 1.2.10
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Integer overflow in X MultiMedia System (xmms) 1.2.10, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which triggers memory corruption.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Application | 1 |
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_XMMS-3075.NASL description Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files. (CVE-2007-0653 / CVE-2007-0654) last seen 2020-06-01 modified 2020-06-02 plugin id 29602 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29602 title SuSE 10 Security Update : XMMS (ZYPP Patch Number 3075) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The text description of this plugin is (C) Novell, Inc. # include("compat.inc"); if (description) { script_id(29602); script_version ("1.12"); script_cvs_date("Date: 2019/10/25 13:36:31"); script_cve_id("CVE-2007-0653", "CVE-2007-0654"); script_name(english:"SuSE 10 Security Update : XMMS (ZYPP Patch Number 3075)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 10 host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files. (CVE-2007-0653 / CVE-2007-0654)" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2007-0653.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2007-0654.html" ); script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 3075."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux"); script_set_attribute(attribute:"patch_publication_date", value:"2007/04/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/13"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled."); if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE."); if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages."); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) exit(1, "Failed to determine the architecture type."); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented."); flag = 0; if (rpm_check(release:"SLED10", sp:0, reference:"xmms-lib-1.2.10-103.8")) flag++; if (rpm_check(release:"SLED10", sp:0, cpu:"x86_64", reference:"xmms-lib-32bit-1.2.10-103.8")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else exit(0, "The host is not affected.");
NASL family Fedora Local Security Checks NASL id FEDORA_2011-9421.NASL description fix CVE-2007-0653 (better late than never, huh?) fix alsa output plugin loop fix desktop file Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 55680 published 2011-07-26 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/55680 title Fedora 14 : xmms-1.2.11-15.20071117cvs.fc14 (2011-9421) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2011-9421. # include("compat.inc"); if (description) { script_id(55680); script_version("1.11"); script_cvs_date("Date: 2019/08/02 13:32:35"); script_bugtraq_id(23078); script_xref(name:"FEDORA", value:"2011-9421"); script_name(english:"Fedora 14 : xmms-1.2.11-15.20071117cvs.fc14 (2011-9421)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "fix CVE-2007-0653 (better late than never, huh?) fix alsa output plugin loop fix desktop file Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=434692" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=459206" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=701036" ); # https://lists.fedoraproject.org/pipermail/package-announce/2011-July/063014.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?40a2fb21" ); script_set_attribute(attribute:"solution", value:"Update the affected xmms package."); script_set_cvss_base_vector("CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:ND"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:xmms"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:14"); script_set_attribute(attribute:"patch_publication_date", value:"2011/07/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/07/26"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/03/21"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^14([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 14.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC14", reference:"xmms-1.2.11-15.20071117cvs.fc14")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xmms"); }
NASL family SuSE Local Security Checks NASL id SUSE9_11483.NASL description Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files. (CVE-2007-0653 / CVE-2007-0654) last seen 2020-06-01 modified 2020-06-02 plugin id 41122 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41122 title SuSE9 Security Update : XMMS (YOU Patch Number 11483) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1277.NASL description Multiple errors have been found in the skin handling routines in xmms, the X Multimedia System. These vulnerabilities could allow an attacker to run arbitrary code as the user running xmms by inducing the victim to load specially crafted interface skin files. last seen 2020-06-01 modified 2020-06-02 plugin id 25011 published 2007-04-10 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25011 title Debian DSA-1277-1 : XMMS - several vulnerabilities NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_20E23B65A52E11E3AE3A00224D7C32A2.NASL description Secunia reports : Secunia Research has discovered two vulnerabilities in XMMS, which can be exploited by malicious people to compromise a user last seen 2020-06-01 modified 2020-06-02 plugin id 72872 published 2014-03-07 reporter This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/72872 title FreeBSD : xmms -- Integer Overflow And Underflow Vulnerabilities (20e23b65-a52e-11e3-ae3a-00224d7c32a2) NASL family Fedora Local Security Checks NASL id FEDORA_2011-9413.NASL description fix CVE-2007-0653 (better late than never, huh?) fix alsa output plugin loop fix desktop file Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 55679 published 2011-07-26 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/55679 title Fedora 15 : xmms-1.2.11-15.20071117cvs.fc15 (2011-9413) NASL family SuSE Local Security Checks NASL id SUSE_XMMS-3073.NASL description Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files (CVE-2007-0653,CVE-2007-0654). last seen 2020-06-01 modified 2020-06-02 plugin id 27490 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27490 title openSUSE 10 Security Update : xmms (xmms-3073) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-445-1.NASL description Sven Krewitt of Secunia Research discovered that XMMS did not correctly handle BMP images when loading GUI skins. If a user were tricked into loading a specially crafted skin, a remote attacker could execute arbitrary code with user privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 28042 published 2007-11-10 reporter Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/28042 title Ubuntu 5.10 / 6.06 LTS / 6.10 : xmms vulnerabilities (USN-445-1)
Statements
contributor | Mark J Cox |
lastmodified | 2008-04-04 |
organization | Red Hat |
statement | Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=228013 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. |
References
- http://secunia.com/advisories/23986
- http://secunia.com/advisories/24645
- http://secunia.com/advisories/24804
- http://secunia.com/advisories/24889
- http://secunia.com/secunia_research/2007-47/advisory/
- http://www.debian.org/security/2007/dsa-1277
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:071
- http://www.novell.com/linux/security/advisories/2007_6_sr.html
- http://www.securityfocus.com/archive/1/463408/100/0/threaded
- http://www.securityfocus.com/bid/23078
- http://www.ubuntu.com/usn/usn-445-1
- http://www.vupen.com/english/advisories/2007/1057
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33205