Vulnerabilities > CVE-2007-2833
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Emacs 21 allows user-assisted attackers to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 12 | |
OS | 7 | |
Application | 1 |
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_EMACS-4190.NASL description This update fixes a bug in parsing GIF images that lead to a crash of emacs. (CVE-2007-2833) last seen 2020-06-01 modified 2020-06-02 plugin id 29416 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29416 title SuSE 10 Security Update : GNU Emacs (ZYPP Patch Number 4190) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The text description of this plugin is (C) Novell, Inc. # include("compat.inc"); if (description) { script_id(29416); script_version ("1.15"); script_cvs_date("Date: 2019/10/25 13:36:29"); script_cve_id("CVE-2007-2833"); script_name(english:"SuSE 10 Security Update : GNU Emacs (ZYPP Patch Number 4190)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 10 host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "This update fixes a bug in parsing GIF images that lead to a crash of emacs. (CVE-2007-2833)" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2007-2833.html" ); script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 4190."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux"); script_set_attribute(attribute:"patch_publication_date", value:"2007/08/31"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/13"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled."); if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE."); if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages."); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) exit(1, "Failed to determine the architecture type."); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented."); flag = 0; if (rpm_check(release:"SLED10", sp:1, reference:"emacs-21.3-224.7")) flag++; if (rpm_check(release:"SLED10", sp:1, reference:"emacs-info-21.3-224.7")) flag++; if (rpm_check(release:"SLED10", sp:1, reference:"emacs-x11-21.3-224.7")) flag++; if (rpm_check(release:"SLES10", sp:1, reference:"emacs-21.3-224.7")) flag++; if (rpm_check(release:"SLES10", sp:1, reference:"emacs-el-21.3-224.7")) flag++; if (rpm_check(release:"SLES10", sp:1, reference:"emacs-info-21.3-224.7")) flag++; if (rpm_check(release:"SLES10", sp:1, reference:"emacs-nox-21.3-224.7")) flag++; if (rpm_check(release:"SLES10", sp:1, reference:"emacs-x11-21.3-224.7")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else exit(0, "The host is not affected.");
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1316.NASL description It has been discovered that emacs, the GNU Emacs editor, will crash when processing certain types of images. last seen 2020-06-01 modified 2020-06-02 plugin id 25582 published 2007-06-27 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25582 title Debian DSA-1316-1 : emacs21 - denial of service code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-1316. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(25582); script_version("1.15"); script_cvs_date("Date: 2019/08/02 13:32:20"); script_cve_id("CVE-2007-2833"); script_xref(name:"DSA", value:"1316"); script_name(english:"Debian DSA-1316-1 : emacs21 - denial of service"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "It has been discovered that emacs, the GNU Emacs editor, will crash when processing certain types of images." ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408929" ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2007/dsa-1316" ); script_set_attribute( attribute:"solution", value: "Upgrade the emacs21 package. For the stable distribution (etch), this problem has been fixed in version 21.4a+1-3etch1." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:emacs21"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:4.0"); script_set_attribute(attribute:"patch_publication_date", value:"2007/06/21"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/06/27"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"4.0", prefix:"emacs", reference:"21.4a+1-3etch1")) flag++; if (deb_check(release:"4.0", prefix:"emacs21", reference:"21.4a+1-3etch1")) flag++; if (deb_check(release:"4.0", prefix:"emacs21-bin-common", reference:"21.4a+1-3etch1")) flag++; if (deb_check(release:"4.0", prefix:"emacs21-common", reference:"21.4a+1-3etch1")) flag++; if (deb_check(release:"4.0", prefix:"emacs21-el", reference:"21.4a+1-3etch1")) flag++; if (deb_check(release:"4.0", prefix:"emacs21-nox", reference:"21.4a+1-3etch1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-133.NASL description A vulnerability in emacs was discovered where it would crash when processing certain types of images. Updated packages have been patched to prevent this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25599 published 2007-06-27 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25599 title Mandrake Linux Security Advisory : emacs (MDKSA-2007:133) NASL family SuSE Local Security Checks NASL id SUSE_EMACS-4197.NASL description This update fixes a bug in parsing GIF images that lead to a crash of emacs. (CVE-2007-2833) last seen 2020-06-01 modified 2020-06-02 plugin id 27204 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27204 title openSUSE 10 Security Update : emacs (emacs-4197) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-504-1.NASL description Hendrik Tews discovered that emacs21 did not correctly handle certain GIF images. By tricking a user into opening a specially crafted GIF, a remote attacker could cause emacs21 to crash, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 28108 published 2007-11-10 reporter Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/28108 title Ubuntu 6.06 LTS / 6.10 / 7.04 : emacs21 vulnerability (USN-504-1)
Statements
contributor | Mark J Cox |
lastmodified | 2007-06-26 |
organization | Red Hat |
statement | Red Hat does not consider a user-assisted crash of a user application such as Emacs to be a security issue. |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408929
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408929
- http://secunia.com/advisories/26987
- http://secunia.com/advisories/26987
- http://www.debian.org/security/2007/dsa-1316
- http://www.debian.org/security/2007/dsa-1316
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:133
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:133
- http://www.novell.com/linux/security/advisories/2007_19_sr.html
- http://www.novell.com/linux/security/advisories/2007_19_sr.html
- http://www.securityfocus.com/bid/24570
- http://www.securityfocus.com/bid/24570
- http://www.securitytracker.com/id?1018277
- http://www.securitytracker.com/id?1018277
- http://www.ubuntu.com/usn/usn-504-1
- http://www.ubuntu.com/usn/usn-504-1
- https://issues.rpath.com/browse/RPL-1490
- https://issues.rpath.com/browse/RPL-1490