7.5
CVSSv2

CVE-2007-6697

Published: 01/02/2008 Updated: 15/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the LWZReadByte function in IMG_gif.c in SDL_image prior to 1.2.7 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, a similar issue to CVE-2006-4484. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

sdl sdl image

Vendor Advisories

Debian Bug report logs - #464056 CVE-2006-4484: buffer overflow in giftopnm Package: netpbm; Maintainer for netpbm is Andreas Barth <aba@notsoarghorg>; Source for netpbm is src:netpbm-free (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Mon, 4 Feb 2008 22:15:01 UTC Severity: important Ta ...
Michael Skladnikiewicz discovered that SDL_image did not correctly load GIF images If a user or automated system were tricked into processing a specially crafted GIF, a remote attacker could execute arbitrary code or cause a crash, leading to a denial of service (CVE-2007-6697) ...
Several local/remote vulnerabilities have been discovered in the image loading library for the Simple DirectMedia Layer 12 The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6697 Gynvael Coldwind discovered a buffer overflow in GIF image parsing, which could result in denial of service and potent ...

Exploits

source: wwwsecurityfocuscom/bid/27417/info The SDL_image library is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input The issue occurs when handling malformed GIF images Attackers can leverage this issue to execute arbitrary code in the context of an application ...