{"api_version":"1","generated_at":"2026-04-22T23:29:21+00:00","cve":"CVE-2007-4476","urls":{"html":"https://cve.report/CVE-2007-4476","api":"https://cve.report/api/cve/CVE-2007-4476.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-4476","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-4476"},"summary":{"title":"CVE-2007-4476","description":"Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a \"crashing stack.\"","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2007-09-05 01:17:00","updated_at":"2021-05-17 19:55:00"},"problem_types":["CWE-119","NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=280961","name":"https://bugzilla.redhat.com/show_bug.cgi?id=280961","refsource":"CONFIRM","tags":[],"title":"Bug 280961 – CVE-2007-4476 tar/cpio stack crashing in safer_name_suffix","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2008/dsa-1566","name":"DSA-1566","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-1566-1 cpio","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00073.html","name":"FEDORA-2007-735","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora Core 6 Update: tar-1.15.1-27.fc6","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2010/0628","name":"ADV-2010-0628","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/39008","name":"39008","refsource":"SECUNIA","tags":[],"title":"Red Hat update for tar - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/33567","name":"33567","refsource":"SECUNIA","tags":[],"title":"Ubuntu update for tar - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9336","name":"oval:org.mitre.oval:def:9336","refsource":"OVAL","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2007/dsa-1438","name":"DSA-1438","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-1438-1 tar","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26987","name":"26987","refsource":"SECUNIA","tags":[],"title":"SUSE Update for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27681","name":"27681","refsource":"SECUNIA","tags":[],"title":"Gentoo update for cpio - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27514","name":"27514","refsource":"SECUNIA","tags":[],"title":"Fedora update for tar - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:233","name":"MDKSA-2007:233","refsource":"MANDRIVA","tags":[],"title":"Support / Security / Advisories /  / MDKSA-2007:233 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2007_19_sr.html","name":"SUSE-SR:2007:019","refsource":"SUSE","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://bugs.gentoo.org/show_bug.cgi?id=196978","name":"http://bugs.gentoo.org/show_bug.cgi?id=196978","refsource":"CONFIRM","tags":[],"title":"Gentoo Bug 196978 - app-arch/cpio safer_name_suffix buffer overflow (CVE-2007-4476)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1","name":"1021680","refsource":"SUNALERT","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://www.ubuntu.com/usn/usn-709-1","name":"USN-709-1","refsource":"UBUNTU","tags":[],"title":"USN-709-1: tar vulnerability | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8599","name":"oval:org.mitre.oval:def:8599","refsource":"OVAL","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27857","name":"27857","refsource":"SECUNIA","tags":[],"title":"Mandriva update for cpio - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2007_18_sr.html","name":"SUSE-SR:2007:018","refsource":"SUSE","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://issues.rpath.com/browse/RPL-1861","name":"https://issues.rpath.com/browse/RPL-1861","refsource":"CONFIRM","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://www.vupen.com/english/advisories/2010/0629","name":"ADV-2010-0629","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html","name":"FEDORA-2007-2673","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 7 Update: tar-1.15.1-28.fc7","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26674","name":"26674","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"SUSE Updates for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27331","name":"27331","refsource":"SECUNIA","tags":[],"title":"rPath update for cpio and tar - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:197","name":"MDKSA-2007:197","refsource":"MANDRIVA","tags":[],"title":"Support / Security / Advisories /  / MDKSA-2007:197 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/28255","name":"28255","refsource":"SECUNIA","tags":[],"title":"Debian update for tar - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27453","name":"27453","refsource":"SECUNIA","tags":[],"title":"Fedora update for tar - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7114","name":"oval:org.mitre.oval:def:7114","refsource":"OVAL","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/usn-650-1","name":"USN-650-1","refsource":"UBUNTU","tags":[],"title":"USN-650-1: cpio vulnerability | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-200711-18.xml","name":"GLSA-200711-18","refsource":"GENTOO","tags":[],"title":"Cpio: Buffer overflow — Gentoo Linux Documentation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/32051","name":"32051","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA32051 - Ubuntu update for cpio - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2010-0141.html","name":"RHSA-2010:0141","refsource":"REDHAT","tags":[],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/29968","name":"29968","refsource":"SECUNIA","tags":[],"title":"Debian update for cpio - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2010-0144.html","name":"RHSA-2010:0144","refsource":"REDHAT","tags":[],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","refsource":"CONFIRM","tags":[],"title":"Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPView","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691","refsource":"CONFIRM","tags":[],"title":"2015-07 Security Bulletin: CTPView: Multiple vulnerabilities in CTPView - Juniper Networks","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/26445","name":"26445","refsource":"BID","tags":[],"title":"GNU TAR and CPIO safer_name_suffix Remote Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-4476","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-4476","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"4476","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"6.06","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4476","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"7.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4476","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"7.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4476","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4476","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4476","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"tar","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4476","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"tar","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4476","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"10","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4476","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"10","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2007-4476","organization":"Red Hat","lastmodified":"2010-03-15","contributor":"Mark J Cox","statementText":"This issue was addressed in Red Hat Enterprise Linux 4 and 5 via https://rhn.redhat.com/errata/RHSA-2010-0141.html for tar. It did not affect the version of tar as shipped with Red Hat Enterprise Linux 3. This issue was also addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2010-0144.html for cpio. It did not affect the version of cpio as shipped with Red Hat Enterprise Linux 3 and 4.","cve_year":"2007","cve_id":"4476","crc32":"b752704b"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2007-4476","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a \"crashing stack.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_affected":"=","version_value":"n/a"}]}}]}}]}},"references":{"reference_data":[{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","refsource":"MISC","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"},{"url":"http://secunia.com/advisories/26987","refsource":"MISC","name":"http://secunia.com/advisories/26987"},{"url":"http://www.novell.com/linux/security/advisories/2007_19_sr.html","refsource":"MISC","name":"http://www.novell.com/linux/security/advisories/2007_19_sr.html"},{"url":"http://secunia.com/advisories/26674","refsource":"MISC","name":"http://secunia.com/advisories/26674"},{"url":"http://secunia.com/advisories/27453","refsource":"MISC","name":"http://secunia.com/advisories/27453"},{"url":"http://secunia.com/advisories/28255","refsource":"MISC","name":"http://secunia.com/advisories/28255"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1","refsource":"MISC","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1"},{"url":"http://www.debian.org/security/2007/dsa-1438","refsource":"MISC","name":"http://www.debian.org/security/2007/dsa-1438"},{"url":"http://www.novell.com/linux/security/advisories/2007_18_sr.html","refsource":"MISC","name":"http://www.novell.com/linux/security/advisories/2007_18_sr.html"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html","refsource":"MISC","name":"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691","refsource":"MISC","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691"},{"url":"http://bugs.gentoo.org/show_bug.cgi?id=196978","refsource":"MISC","name":"http://bugs.gentoo.org/show_bug.cgi?id=196978"},{"url":"http://secunia.com/advisories/27331","refsource":"MISC","name":"http://secunia.com/advisories/27331"},{"url":"http://secunia.com/advisories/27514","refsource":"MISC","name":"http://secunia.com/advisories/27514"},{"url":"http://secunia.com/advisories/27681","refsource":"MISC","name":"http://secunia.com/advisories/27681"},{"url":"http://secunia.com/advisories/27857","refsource":"MISC","name":"http://secunia.com/advisories/27857"},{"url":"http://secunia.com/advisories/29968","refsource":"MISC","name":"http://secunia.com/advisories/29968"},{"url":"http://secunia.com/advisories/32051","refsource":"MISC","name":"http://secunia.com/advisories/32051"},{"url":"http://secunia.com/advisories/33567","refsource":"MISC","name":"http://secunia.com/advisories/33567"},{"url":"http://secunia.com/advisories/39008","refsource":"MISC","name":"http://secunia.com/advisories/39008"},{"url":"http://security.gentoo.org/glsa/glsa-200711-18.xml","refsource":"MISC","name":"http://security.gentoo.org/glsa/glsa-200711-18.xml"},{"url":"http://www.debian.org/security/2008/dsa-1566","refsource":"MISC","name":"http://www.debian.org/security/2008/dsa-1566"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:197","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:197"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:233","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:233"},{"url":"http://www.redhat.com/support/errata/RHSA-2010-0141.html","refsource":"MISC","name":"http://www.redhat.com/support/errata/RHSA-2010-0141.html"},{"url":"http://www.redhat.com/support/errata/RHSA-2010-0144.html","refsource":"MISC","name":"http://www.redhat.com/support/errata/RHSA-2010-0144.html"},{"url":"http://www.securityfocus.com/bid/26445","refsource":"MISC","name":"http://www.securityfocus.com/bid/26445"},{"url":"http://www.ubuntu.com/usn/usn-650-1","refsource":"MISC","name":"http://www.ubuntu.com/usn/usn-650-1"},{"url":"http://www.ubuntu.com/usn/usn-709-1","refsource":"MISC","name":"http://www.ubuntu.com/usn/usn-709-1"},{"url":"http://www.vupen.com/english/advisories/2010/0628","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2010/0628"},{"url":"http://www.vupen.com/english/advisories/2010/0629","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2010/0629"},{"url":"https://issues.rpath.com/browse/RPL-1861","refsource":"MISC","name":"https://issues.rpath.com/browse/RPL-1861"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7114","refsource":"MISC","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7114"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8599","refsource":"MISC","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8599"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9336","refsource":"MISC","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9336"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00073.html","refsource":"MISC","name":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00073.html"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=280961","refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=280961"}]}},"nvd":{"publishedDate":"2007-09-05 01:17:00","lastModifiedDate":"2021-05-17 19:55:00","problem_types":["CWE-119","NVD-CWE-noinfo"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gnu:tar:*:*:*:*:*:*:*:*","versionEndExcluding":"1.19","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"4476","Ordinal":"27146","Title":"CVE-2007-4476","CVE":"CVE-2007-4476","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"4476","Ordinal":"1","NoteData":"Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a \"crashing stack.\"","Type":"Description","Title":null},{"CveYear":"2007","CveId":"4476","Ordinal":"2","NoteData":"2007-09-04","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"4476","Ordinal":"3","NoteData":"2017-09-28","Type":"Other","Title":"Modified"}]}}}