Vulnerability Details : CVE-2007-6613
Stack-based buffer overflow in the print_iso9660_recurse function in iso-info (src/iso-info.c) in GNU Compact Disc Input and Control Library (libcdio) 0.79 and earlier allows context-dependent attackers to cause a denial of service (core dump) and possibly execute arbitrary code via a disk or image that contains a long joilet file name.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2007-6613
Probability of exploitation activity in the next 30 days: 1.64%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 86 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-6613
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2007-6613
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-6613
-
https://bugzilla.redhat.com/show_bug.cgi?id=427197
Exploit
-
http://www.securityfocus.com/bid/27131
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:037
-
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
[security-announce] SUSE Security Summary Report SUSE-SR:2008:005 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://www.vupen.com/english/advisories/2008/0030
-
http://bugs.gentoo.org/show_bug.cgi?id=203777
Exploit;Patch
-
http://security.gentoo.org/glsa/glsa-200801-08.xml
-
http://www.ubuntu.com/usn/usn-580-1
-
http://lists.gnu.org/archive/html/libcdio-devel/2007-12/msg00009.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/39405
Products affected by CVE-2007-6613
- cpe:2.3:a:gnu:libcdio:*:*:*:*:*:*:*:*