CVE-2007-6697

Public Exploit

Description

Buffer overflow in the LWZReadByte function in IMG_gif.c in SDL_image before 1.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, a similar issue to CVE-2006-4484. NOTE: some of these details are obtained from third party information.

Category

7.5
CVSS
Severity: High
CVSS 2.0 •
EPSS 23.84% Top 5%
Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory debian.org Vendor Advisory gentoo.org Vendor Advisory ubuntu.com Vendor Advisory mandriva.com Vendor Advisory secunia.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_gif.c?r1=2970&r2=3462 exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/39865 vdb entry
http://secunia.com/advisories/28869 third party advisory
http://secunia.com/advisories/28850 third party advisory
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00008.html vendor advisory
http://secunia.com/advisories/28752 third party advisory
https://issues.rpath.com/browse/RPL-2206
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00039.html vendor advisory
http://bugs.gentoo.org/show_bug.cgi?id=207933
http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/CHANGES?revision=3462&view=markup patch
http://secunia.com/advisories/29542 third party advisory
http://www.debian.org/security/2008/dsa-1493 vendor advisory
http://www.securityfocus.com/bid/27417 vdb entry
http://secunia.com/advisories/28640 third party advisory vendor advisory
http://wiki.rpath.com/Advisories:rPSA-2008-0061
http://www.securityfocus.com/archive/1/488079/100/0/threaded mailing list
http://secunia.com/advisories/28830 third party advisory
http://marc.info/?l=bugtraq&m=120110205511630&w=2 mailing list exploit
http://www.gentoo.org/security/en/glsa/glsa-200802-01.xml vendor advisory
http://vexillium.org/?sec-sdlgif exploit
http://www.ubuntu.com/usn/usn-595-1 vendor advisory
http://www.vupen.com/english/advisories/2008/0266 vdb entry
http://www.mandriva.com/security/advisories?name=MDVSA-2008:040 vendor advisory
http://secunia.com/advisories/28837 third party advisory

Frequently Asked Questions

What is the severity of CVE-2007-6697?
CVE-2007-6697 has been scored as a high severity vulnerability.
How to fix CVE-2007-6697?
To fix CVE-2007-6697, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2007-6697 being actively exploited in the wild?
It is possible that CVE-2007-6697 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~24% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.