CVE-2006-3376
Summary
| CVE | CVE-2006-3376 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-07-06 20:05:00 UTC |
| Updated | 2018-10-18 16:47:00 UTC |
| Description | Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, and (6) imagemagick allows remote attackers to execute arbitrary code via the MaxRecordSize header field in a WMF file. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Wvware | Libwmf | 0.2.8_.4 | All | All | All |
| Application | Wvware | Libwmf | 0.2.8_.4 | All | All | All |
| Application | Wvware | Wv2 | 0.2.1 | All | All | All |
| Application | Wvware | Wv2 | 0.2.2 | All | All | All |
| Application | Wvware | Wv2 | 0.2.3 | All | All | All |
| Application | Wvware | Wv2 | 0.2.1 | All | All | All |
| Application | Wvware | Wv2 | 0.2.2 | All | All | All |
| Application | Wvware | Wv2 | 0.2.3 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Secunia - Advisories - Ubuntu update for libwmf | SECUNIA | secunia.com | |
| Secunia - Advisories - Mandriva update for libwmf | SECUNIA | secunia.com | |
| LibWMF WMF File Handling Integer Overflow Vulnerability | BID | www.securityfocus.com | |
| Debian update for libwmf - Secunia.com | SECUNIA | secunia.com | |
| Red Hat update for libwmf - Advisories - Secunia | SECUNIA | secunia.com | |
| usn/usn-333-1 - Ubuntu: Linux for human beings | UBUNTU | www.ubuntu.com | |
| rhn.redhat.com | Red Hat Support | REDHAT | rhn.redhat.com | |
| Webmail - OVH | VUPEN | www.vupen.com | |
| Debian -- Security Information -- DSA-1194-1 libwmf | DEBIAN | www.debian.org | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| libwmf Integer Overflow in 'player.c' Lets Remote Users Execute Arbitrary Code - SecurityTracker | SECTRACK | securitytracker.com | |
| Advisories - Mandriva Linux | MANDRIVA | www.mandriva.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| SUSE Updates for Multiple Packages - Advisories - Secunia | SECUNIA | secunia.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| libwmf integer/heap overflow - CXSecurity.com | SREASON | securityreason.com | |
| Gentoo Linux Documentation -- libwmf: Buffer overflow vulnerability | GENTOO | security.gentoo.org | |
| Security Announcement | SUSE | www.novell.com | |
| Secunia - Advisories - Gentoo update for libwmf | SECUNIA | secunia.com | |
| libwmf Integer Overflow Vulnerability - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2007-03-14 | Mark J Cox | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
There are currently no legacy QID mappings associated with this CVE.