Vulnerability CVE-2007-2053


Published: 2007-04-30   Modified: 2012-02-12

Description:
Multiple stack-based buffer overflows in AFFLIB before 2.2.6 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a long LastModified value in an S3 XML response in lib/s3.cpp; (2) a long (a) path or (b) bucket in an S3 URL in lib/vnode_s3.cpp; or (3) a long (c) EFW, (d) AFD, or (c) aimage file path. NOTE: the aimage vector (3c) has since been recalled from the researcher's original advisory, since the code is not called in any version of AFFLIB.

See advisories in our WLB2 database:
Topic
Author
Date
High
AFFLIB(TM): Multiple Buffer Overflows
Timothy D. Morga...
04.05.2007

Type:

CWE-Other

Vendor: Afflib
Product: Afflib 
Version: 2.2.0;

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://securityreason.com/securityalert/2655
http://www.securityfocus.com/archive/1/467038/100/0/threaded
http://www.securityfocus.com/bid/23695
http://www.vsecurity.com/bulletins/advisories/2007/afflib-overflows.txt
https://exchange.xforce.ibmcloud.com/vulnerabilities/33961

Related CVE
CVE-2007-2352
Multiple format string vulnerabilities in AFFLIB 2.2.6 allow remote attackers to execute arbitrary code via certain command line parameters, which are used in (1) warn and (2) err calls, possibly involving (a) lib/s3.cpp, (b) tools/afconvert.cpp, (c)...
CVE-2007-2054
Multiple format string vulnerabilities in AFFLIB before 2.2.6 allow remote attackers to execute arbitrary code via certain command line parameters, which are used in (1) warn and (2) err calls in (a) lib/s3.cpp, (b) tools/afconvert.cpp, (c) tools/afc...
CVE-2007-2055
AFFLIB 2.2.8 and earlier allows attackers to execute arbitrary commands via shell metacharacters involving (1) certain command line parameters in tools/afconvert.cpp and (2) arguments to the get_parameter function in aimage/ident.cpp. NOTE: it is un...

Copyright 2019, cxsecurity.com

 

Back to Top