Multiple format string vulnerabilities in AFFLIB before 2.2.6 allow remote attackers to execute arbitrary code via certain command line parameters, which are used in (1) warn and (2) err calls in (a) lib/s3.cpp, (b) tools/afconvert.cpp, (c) tools/afcopy.cpp, (d) tools/afinfo.cpp, (e) aimage/aimage.cpp, (f) aimage/imager.cpp, and (g) tools/afxml.cpp. NOTE: the aimage.cpp vector (e) has since been recalled from the researcher's original advisory, since the code is not called in any version of AFFLIB.
References
Configurations
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/2657 - | |
References | () http://www.securityfocus.com/archive/1/467040/100/0/threaded - | |
References | () http://www.vsecurity.com/bulletins/advisories/2007/afflib-fmtstr.txt - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33969 - |
Information
Published : 2007-04-30 22:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-2054
Mitre link : CVE-2007-2054
CVE.ORG link : CVE-2007-2054
JSON object : View
Products Affected
afflib
- afflib
CWE