Vulnerabilities > CVE-2007-2833 - Remote Denial of Service vulnerability in GNU Emacs Image Processing

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
debian
mandrakesoft
gnu
nessus

Summary

Emacs 21 allows user-assisted attackers to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation.

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_EMACS-4190.NASL
    descriptionThis update fixes a bug in parsing GIF images that lead to a crash of emacs. (CVE-2007-2833)
    last seen2020-06-01
    modified2020-06-02
    plugin id29416
    published2007-12-13
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/29416
    titleSuSE 10 Security Update : GNU Emacs (ZYPP Patch Number 4190)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The text description of this plugin is (C) Novell, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(29416);
      script_version ("1.15");
      script_cvs_date("Date: 2019/10/25 13:36:29");
    
      script_cve_id("CVE-2007-2833");
    
      script_name(english:"SuSE 10 Security Update : GNU Emacs (ZYPP Patch Number 4190)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 10 host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update fixes a bug in parsing GIF images that lead to a crash of
    emacs. (CVE-2007-2833)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2007-2833.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 4190.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/08/31");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
    if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE.");
    if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages.");
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) exit(1, "Failed to determine the architecture type.");
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented.");
    
    
    flag = 0;
    if (rpm_check(release:"SLED10", sp:1, reference:"emacs-21.3-224.7")) flag++;
    if (rpm_check(release:"SLED10", sp:1, reference:"emacs-info-21.3-224.7")) flag++;
    if (rpm_check(release:"SLED10", sp:1, reference:"emacs-x11-21.3-224.7")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"emacs-21.3-224.7")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"emacs-el-21.3-224.7")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"emacs-info-21.3-224.7")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"emacs-nox-21.3-224.7")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"emacs-x11-21.3-224.7")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else exit(0, "The host is not affected.");
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1316.NASL
    descriptionIt has been discovered that emacs, the GNU Emacs editor, will crash when processing certain types of images.
    last seen2020-06-01
    modified2020-06-02
    plugin id25582
    published2007-06-27
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25582
    titleDebian DSA-1316-1 : emacs21 - denial of service
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-1316. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(25582);
      script_version("1.15");
      script_cvs_date("Date: 2019/08/02 13:32:20");
    
      script_cve_id("CVE-2007-2833");
      script_xref(name:"DSA", value:"1316");
    
      script_name(english:"Debian DSA-1316-1 : emacs21 - denial of service");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It has been discovered that emacs, the GNU Emacs editor, will crash
    when processing certain types of images."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408929"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2007/dsa-1316"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the emacs21 package.
    
    For the stable distribution (etch), this problem has been fixed in
    version 21.4a+1-3etch1."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:emacs21");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:4.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/06/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/06/27");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"4.0", prefix:"emacs", reference:"21.4a+1-3etch1")) flag++;
    if (deb_check(release:"4.0", prefix:"emacs21", reference:"21.4a+1-3etch1")) flag++;
    if (deb_check(release:"4.0", prefix:"emacs21-bin-common", reference:"21.4a+1-3etch1")) flag++;
    if (deb_check(release:"4.0", prefix:"emacs21-common", reference:"21.4a+1-3etch1")) flag++;
    if (deb_check(release:"4.0", prefix:"emacs21-el", reference:"21.4a+1-3etch1")) flag++;
    if (deb_check(release:"4.0", prefix:"emacs21-nox", reference:"21.4a+1-3etch1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2007-133.NASL
    descriptionA vulnerability in emacs was discovered where it would crash when processing certain types of images. Updated packages have been patched to prevent this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id25599
    published2007-06-27
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/25599
    titleMandrake Linux Security Advisory : emacs (MDKSA-2007:133)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_EMACS-4197.NASL
    descriptionThis update fixes a bug in parsing GIF images that lead to a crash of emacs. (CVE-2007-2833)
    last seen2020-06-01
    modified2020-06-02
    plugin id27204
    published2007-10-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27204
    titleopenSUSE 10 Security Update : emacs (emacs-4197)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-504-1.NASL
    descriptionHendrik Tews discovered that emacs21 did not correctly handle certain GIF images. By tricking a user into opening a specially crafted GIF, a remote attacker could cause emacs21 to crash, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id28108
    published2007-11-10
    reporterUbuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/28108
    titleUbuntu 6.06 LTS / 6.10 / 7.04 : emacs21 vulnerability (USN-504-1)

Statements

contributorMark J Cox
lastmodified2007-06-26
organizationRed Hat
statementRed Hat does not consider a user-assisted crash of a user application such as Emacs to be a security issue.