WinImage FAT Image Files Multiple Buffer Overflow Vulnerabilities
BID:24026
Info
WinImage FAT Image Files Multiple Buffer Overflow Vulnerabilities
| Bugtraq ID: | 24026 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-2758 |
| Remote: | Yes |
| Local: | No |
| Published: | May 17 2007 12:00AM |
| Updated: | May 07 2015 05:39PM |
| Credit: | Tan Chew Keong is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
WinImage WinImage 8.0.8000 |
| Not Vulnerable: | |
Discussion
WinImage FAT Image Files Multiple Buffer Overflow Vulnerabilities
WinImage is prone to multiple buffer-overflow vulnerabilities because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
Remote attackers can exploit these issues by enticing an unsuspecting victim to open a maliciously crafted FAT image file. A successful exploit could let attackers execute arbitrary code in the context of the vulnerable application.
WinImage 8.0.8000 is vulnerable to these issues; other versions may also be affected.
WinImage is prone to multiple buffer-overflow vulnerabilities because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
Remote attackers can exploit these issues by enticing an unsuspecting victim to open a maliciously crafted FAT image file. A successful exploit could let attackers execute arbitrary code in the context of the vulnerable application.
WinImage 8.0.8000 is vulnerable to these issues; other versions may also be affected.
Exploit / POC
WinImage FAT Image Files Multiple Buffer Overflow Vulnerabilities
The researcher responsible for discovering these issues has developed exploit code to trigger them. This code has not been released publicly.
The researcher responsible for discovering these issues has developed exploit code to trigger them. This code has not been released publicly.
Solution / Fix
WinImage FAT Image Files Multiple Buffer Overflow Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
WinImage FAT Image Files Multiple Buffer Overflow Vulnerabilities
References:
References:
- Vendor Homepage (WinImage)
- WinImage FAT Image Long Pathname Buffer Overflow Vulnerabilities (vuln.sg)