CVE-2007-1667

Description

Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.

Category

9.3
CVSS
Severity: Critical
CVSS 2.0 •
EPSS 1.14% Top 25%
Vendor Advisory sun.com Vendor Advisory redhat.com Vendor Advisory apple.com Vendor Advisory gentoo.org Vendor Advisory ubuntu.com Vendor Advisory ubuntu.com Vendor Advisory redhat.com Vendor Advisory ubuntu.com Vendor Advisory novell.com Vendor Advisory gentoo.org Vendor Advisory debian.org Vendor Advisory novell.com Vendor Advisory debian.org Vendor Advisory openbsd.org Vendor Advisory mandriva.com Vendor Advisory openbsd.org Vendor Advisory redhat.com Vendor Advisory mandriva.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1 vendor advisory broken link
http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm third party advisory
http://secunia.com/advisories/24745 third party advisory broken link
http://secunia.com/advisories/33937 third party advisory broken link
http://secunia.com/advisories/24771 third party advisory broken link
http://secunia.com/advisories/24756 third party advisory broken link
http://www.redhat.com/support/errata/RHSA-2007-0126.html third party advisory vendor advisory
http://www.securityfocus.com/bid/23300 vdb entry third party advisory
http://support.apple.com/kb/HT3438 third party advisory
http://secunia.com/advisories/24739 third party advisory broken link
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html mailing list third party advisory vendor advisory
http://security.gentoo.org/glsa/glsa-200705-06.xml vendor advisory broken link
http://secunia.com/advisories/24758 third party advisory broken link
http://www.ubuntu.com/usn/usn-453-1 third party advisory vendor advisory
http://www.ubuntu.com/usn/usn-481-1 vendor advisory broken link
https://issues.rpath.com/browse/RPL-1211 broken link
http://rhn.redhat.com/errata/RHSA-2007-0125.html third party advisory vendor advisory
http://secunia.com/advisories/24741 third party advisory broken link
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045 third party advisory
http://secunia.com/advisories/25992 third party advisory broken link
http://secunia.com/advisories/26177 third party advisory broken link
http://www.ubuntu.com/usn/usn-453-2 third party advisory vendor advisory
http://www.vupen.com/english/advisories/2007/1531 vdb entry third party advisory
http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html third party advisory mailing list
http://secunia.com/advisories/24791 third party advisory broken link
http://secunia.com/advisories/24975 third party advisory broken link
http://www.novell.com/linux/security/advisories/2007_27_x.html vendor advisory broken link
http://secunia.com/advisories/30161 third party advisory broken link
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml third party advisory vendor advisory
http://www.debian.org/security/2007/dsa-1294 third party advisory vendor advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684 issue tracking third party advisory
http://www.securitytracker.com/id?1017864 vdb entry third party advisory
http://secunia.com/advisories/24765 third party advisory broken link
http://www.novell.com/linux/security/advisories/2007_8_sr.html third party advisory vendor advisory
http://www.securityfocus.com/archive/1/464686/100/0/threaded mailing list vdb entry third party advisory
http://www.securityfocus.com/archive/1/464816/100/0/threaded mailing list vdb entry third party advisory
http://secunia.com/advisories/25131 third party advisory broken link
http://www.debian.org/security/2009/dsa-1858 third party advisory vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776 vdb entry signature broken link
http://secunia.com/advisories/24953 third party advisory broken link
http://www.vupen.com/english/advisories/2007/1217 vdb entry broken link
http://www.openbsd.org/errata40.html#011_xorg third party advisory vendor advisory
https://issues.rpath.com/browse/RPL-1213 broken link
http://secunia.com/advisories/25004 third party advisory broken link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:147 vendor advisory broken link
http://secunia.com/advisories/25305 third party advisory broken link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693 vdb entry signature broken link
http://secunia.com/advisories/25072 third party advisory broken link
http://www.openbsd.org/errata39.html#021_xorg third party advisory vendor advisory
http://secunia.com/advisories/25112 third party advisory broken link
http://issues.foresightlinux.org/browse/FL-223 broken link
http://secunia.com/advisories/36260 third party advisory
http://www.redhat.com/support/errata/RHSA-2007-0157.html third party advisory vendor advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:079 third party advisory vendor advisory

Frequently Asked Questions

What is the severity of CVE-2007-1667?
CVE-2007-1667 has been scored as a critical severity vulnerability.
How to fix CVE-2007-1667?
To fix CVE-2007-1667, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2007-1667 being actively exploited in the wild?
It is possible that CVE-2007-1667 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.