Vulnerabilities > CVE-2007-2194 - Buffer Overflow vulnerability in Gentoo Xnview 1.90.3
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Stack-based buffer overflow in XnView 1.90.3 allows user-assisted remote attackers to execute arbitrary code via a crafted XPM file with a long section string. NOTE: some of these details are obtained from third party information.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | XnView 1.90.3 (.XPM File) Local Buffer Overflow Exploit. CVE-2007-2194. Local exploit for windows platform |
file | exploits/windows/local/3777.c |
id | EDB-ID:3777 |
last seen | 2016-01-31 |
modified | 2007-04-22 |
platform | windows |
port | |
published | 2007-04-22 |
reporter | Marsu |
source | https://www.exploit-db.com/download/3777/ |
title | XnView 1.90.3 - .XPM Local Buffer Overflow Exploit |
type | local |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200707-06.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200707-06 (XnView: Stack-based buffer overflow) XnView is vulnerable to a stack-based buffer overflow while processing an XPM file with an overly long section string (greater than 1024 bytes). Impact : An attacker could entice a user to view a specially crafted XPM file with XnView that could trigger the vulnerability and possibly execute arbitrary code with the rights of the user running XnView. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25719 |
published | 2007-07-18 |
reporter | This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25719 |
title | GLSA-200707-06 : XnView: Stack-based buffer overflow |
code |
|
References
- http://osvdb.org/35235
- http://secunia.com/advisories/24973
- http://secunia.com/advisories/26006
- http://security.gentoo.org/glsa/glsa-200707-06.xml
- http://www.securityfocus.com/bid/23625
- http://www.vupen.com/english/advisories/2007/1488
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33810
- https://www.exploit-db.com/exploits/3777