CVE-2007-1667

N/A Unknown
Published: March 24, 2007 Modified: April 23, 2026
View on NVD

Description

Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
Source: secalert@redhat.com
Third Party Advisory
http://issues.foresightlinux.org/browse/FL-223
Source: secalert@redhat.com
Broken Link
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2007-0125.html
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/24739
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/24741
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/24745
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/24756
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/24758
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/24765
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/24771
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/24791
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/24953
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/24975
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/25004
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/25072
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/25112
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/25131
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/25305
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/25992
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/26177
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/30161
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/33937
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/36260
Source: secalert@redhat.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200705-06.xml
Source: secalert@redhat.com
Broken Link
http://support.apple.com/kb/HT3438
Source: secalert@redhat.com
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm
Source: secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2007/dsa-1294
Source: secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2009/dsa-1858
Source: secalert@redhat.com
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
Source: secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
Source: secalert@redhat.com
Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_8_sr.html
Source: secalert@redhat.com
Third Party Advisory
http://www.openbsd.org/errata39.html#021_xorg
Source: secalert@redhat.com
Third Party Advisory
http://www.openbsd.org/errata40.html#011_xorg
Source: secalert@redhat.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0126.html
Source: secalert@redhat.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0157.html
Source: secalert@redhat.com
Third Party Advisory
http://www.securityfocus.com/archive/1/464686/100/0/threaded
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/464816/100/0/threaded
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23300
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1017864
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-453-1
Source: secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/usn-453-2
Source: secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/usn-481-1
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2007/1217
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2007/1531
Source: secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684
Source: secalert@redhat.com
Issue Tracking Third Party Advisory
https://issues.rpath.com/browse/RPL-1211
Source: secalert@redhat.com
Broken Link
https://issues.rpath.com/browse/RPL-1213
Source: secalert@redhat.com
Broken Link
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://issues.foresightlinux.org/browse/FL-223
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2007-0125.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/24739
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24741
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24745
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24756
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24758
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24765
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24771
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24791
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24953
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24975
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25004
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25072
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25112
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25131
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25305
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25992
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/26177
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/30161
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/33937
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/36260
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200705-06.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://support.apple.com/kb/HT3438
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2007/dsa-1294
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2009/dsa-1858
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.novell.com/linux/security/advisories/2007_27_x.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.novell.com/linux/security/advisories/2007_8_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.openbsd.org/errata39.html#021_xorg
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.openbsd.org/errata40.html#011_xorg
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0126.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0157.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/464686/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/464816/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23300
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1017864
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-453-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/usn-453-2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/usn-481-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2007/1217
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2007/1531
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://issues.rpath.com/browse/RPL-1211
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://issues.rpath.com/browse/RPL-1213
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link

108 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.1%
84th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian canonical x.org