Tcl/Tk ReadImage Buffer Overflow Vulnerability
BID:25826
Info
Tcl/Tk ReadImage Buffer Overflow Vulnerability
| Bugtraq ID: | 25826 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-5137 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 21 2007 12:00AM |
| Updated: | Mar 19 2015 09:36AM |
| Credit: | The vendor reported this vulnerability. |
| Vulnerable: |
Ubuntu Ubuntu Linux 7.04 sparc Ubuntu Ubuntu Linux 7.04 powerpc Ubuntu Ubuntu Linux 7.04 i386 Ubuntu Ubuntu Linux 7.04 amd64 Ubuntu Ubuntu Linux 6.10 sparc Ubuntu Ubuntu Linux 6.10 powerpc Ubuntu Ubuntu Linux 6.10 i386 Ubuntu Ubuntu Linux 6.10 amd64 Ubuntu Ubuntu Linux 6.06 LTS sparc Ubuntu Ubuntu Linux 6.06 LTS powerpc Ubuntu Ubuntu Linux 6.06 LTS i386 Ubuntu Ubuntu Linux 6.06 LTS amd64 TCL/TK TCL/TK 8.4.15 TCL/TK TCL/TK 8.4.14 TCL/TK TCL/TK 8.4.12 TCL/TK TCL/TK 8.4.3 TCL/TK TCL/TK 8.4.2 TCL/TK TCL/TK 8.3.5 TCL/TK TCL/TK 8.0 SuSE SUSE Linux Enterprise Server 8 SuSE SUSE Linux Enterprise Server 10 SP1 SuSE SUSE Linux Enterprise Server 10 SuSE SUSE Linux Enterprise SDK 10.SP1 SuSE SUSE Linux Enterprise SDK 10 SuSE SUSE Linux Enterprise Desktop 10 SP1 SuSE SUSE Linux Enterprise Desktop 10 SuSE openSUSE 10.3 SuSE Linux Professional 10.2 x86_64 SuSE Linux Personal 10.2 x86_64 S.u.S.E. UnitedLinux 1.0 S.u.S.E. SuSE Linux Standard Server 8.0 S.u.S.E. SuSE Linux School Server for i386 S.u.S.E. SUSE LINUX Retail Solution 8.0 S.u.S.E. SuSE Linux Openexchange Server 4.0 S.u.S.E. openSUSE 10.2 S.u.S.E. Open-Enterprise-Server 0 S.u.S.E. Novell Linux POS 9 S.u.S.E. Novell Linux Desktop 9.0 S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 10.0 S.u.S.E. Linux Professional 10.2 S.u.S.E. Linux Professional 10.1 S.u.S.E. Linux Personal 10.0 OSS S.u.S.E. Linux Personal 10.2 S.u.S.E. Linux Personal 10.1 S.u.S.E. Linux Desktop 10 S.u.S.E. Linux 10.1 x86-64 S.u.S.E. Linux 10.1 x86 S.u.S.E. Linux 10.1 ppc S.u.S.E. Linux 10.0 x86-64 S.u.S.E. Linux 10.0 x86 S.u.S.E. Linux 10.0 ppc RedHat Enterprise Linux Desktop Workstation 5 client Red Hat Fedora Core7 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux 5 Server Mandriva Linux Mandrake 2008.0 x86_64 Mandriva Linux Mandrake 2008.0 Mandriva Linux Mandrake 2007.1 x86_64 Mandriva Linux Mandrake 2007.1 Mandriva Linux Mandrake 2007.0 x86_64 Mandriva Linux Mandrake 2007.0 MandrakeSoft Corporate Server 4.0 x86_64 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 MandrakeSoft Corporate Server 4.0 Gentoo Linux Debian Linux 5.0 sparc Debian Linux 5.0 s/390 Debian Linux 5.0 powerpc Debian Linux 5.0 mipsel Debian Linux 5.0 mips Debian Linux 5.0 m68k Debian Linux 5.0 ia-64 Debian Linux 5.0 ia-32 Debian Linux 5.0 hppa Debian Linux 5.0 armel Debian Linux 5.0 arm Debian Linux 5.0 amd64 Debian Linux 5.0 alpha Debian Linux 5.0 Debian Linux 4.0 sparc Debian Linux 4.0 s/390 Debian Linux 4.0 powerpc Debian Linux 4.0 mipsel Debian Linux 4.0 mips Debian Linux 4.0 m68k Debian Linux 4.0 ia-64 Debian Linux 4.0 ia-32 Debian Linux 4.0 hppa Debian Linux 4.0 armel Debian Linux 4.0 arm Debian Linux 4.0 amd64 Debian Linux 4.0 alpha Debian Linux 4.0 |
| Not Vulnerable: |
TCL/TK TCL/TK 8.4.16 |
Discussion
Tcl/Tk ReadImage Buffer Overflow Vulnerability
Tcl/Tk is prone to a buffer-overflow vulnerability that resides in the Tk library shipped with Tcl.
An attacker can exploit this issue to execute arbitrary code or cause denial-of-service conditions in applications implementing the affected library.
Versions prior to Tcl/Tk 8.4.16 are vulnerable to this issue.
Tcl/Tk is prone to a buffer-overflow vulnerability that resides in the Tk library shipped with Tcl.
An attacker can exploit this issue to execute arbitrary code or cause denial-of-service conditions in applications implementing the affected library.
Versions prior to Tcl/Tk 8.4.16 are vulnerable to this issue.
Exploit / POC
Tcl/Tk ReadImage Buffer Overflow Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Tcl/Tk ReadImage Buffer Overflow Vulnerability
Solution:
The vendor has released fixes. Please see the references for more information.
Debian Linux 5.0 ia-64
Debian Linux 5.0 alpha
Debian Linux 5.0 mipsel
Debian Linux 4.0 amd64
Debian Linux 4.0 ia-32
Debian Linux 5.0 armel
Debian Linux 5.0
Debian Linux 4.0 mipsel
Debian Linux 5.0 mips
Debian Linux 4.0 ia-64
Debian Linux 4.0 mips
Debian Linux 5.0 sparc
Debian Linux 4.0 arm
Debian Linux 4.0 powerpc
Debian Linux 5.0 ia-32
Debian Linux 5.0 s/390
Debian Linux 5.0 hppa
Debian Linux 4.0 sparc
Debian Linux 4.0 s/390
Debian Linux 5.0 m68k
Debian Linux 5.0 arm
Debian Linux 4.0 alpha
TCL/TK TCL/TK 8.0
TCL/TK TCL/TK 8.4.15
TCL/TK TCL/TK 8.4.2
TCL/TK TCL/TK 8.4.3
Solution:
The vendor has released fixes. Please see the references for more information.
Debian Linux 5.0 ia-64
-
Debian libtk-img-dev_1.3-release-7+lenny1_ia64.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- dev_1.3-release-7+lenny1_ia64.deb -
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb -
Debian libtk-img_1.3-release-7+lenny1_ia64.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-release-7+lenny1_ia64.deb
Debian Linux 5.0 alpha
-
Debian libtk-img-dev_1.3-release-7+lenny1_alpha.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- dev_1.3-release-7+lenny1_alpha.deb -
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb -
Debian libtk-img_1.3-release-7+lenny1_alpha.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-release-7+lenny1_alpha.deb
Debian Linux 5.0 mipsel
-
Debian libtk-img-dev_1.3-release-7+lenny1_mipsel.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- dev_1.3-release-7+lenny1_mipsel.deb -
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb -
Debian libtk-img_1.3-release-7+lenny1_mipsel.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-release-7+lenny1_mipsel.deb
Debian Linux 4.0 amd64
-
Debian libtk-img_1.3-15etch3_amd64.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-15etch3_amd64.deb
Debian Linux 4.0 ia-32
-
Debian libtk-img_1.3-15etch3_i386.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-15etch3_i386.deb
Debian Linux 5.0 armel
-
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb
Debian Linux 5.0
-
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb
Debian Linux 4.0 mipsel
-
Debian libtk-img_1.3-15etch3_mipsel.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-15etch3_mipsel.deb
Debian Linux 5.0 mips
-
Debian libtk-img-dev_1.3-release-7+lenny1_mips.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- dev_1.3-release-7+lenny1_mips.deb -
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb -
Debian libtk-img_1.3-release-7+lenny1_mips.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-release-7+lenny1_mips.deb
Debian Linux 4.0 ia-64
-
Debian libtk-img_1.3-15etch3_ia64.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-15etch3_ia64.deb
Debian Linux 4.0 mips
-
Debian libtk-img_1.3-15etch3_mips.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-15etch3_mips.deb
Debian Linux 5.0 sparc
-
Debian libtk-img-dev_1.3-release-7+lenny1_sparc.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- dev_1.3-release-7+lenny1_sparc.deb -
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb -
Debian libtk-img_1.3-release-7+lenny1_sparc.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-release-7+lenny1_sparc.deb
Debian Linux 4.0 arm
-
Debian libtk-img_1.3-15etch3_arm.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-15etch3_arm.deb
Debian Linux 4.0 powerpc
-
Debian libtk-img_1.3-15etch3_powerpc.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-15etch3_powerpc.deb
Debian Linux 5.0 ia-32
-
Debian libtk-img-dev_1.3-release-7+lenny1_i386.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- dev_1.3-release-7+lenny1_i386.deb -
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb -
Debian libtk-img_1.3-release-7+lenny1_i386.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-release-7+lenny1_i386.deb
Debian Linux 5.0 s/390
-
Debian libtk-img-dev_1.3-release-7+lenny1_s390.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- dev_1.3-release-7+lenny1_s390.deb -
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb -
Debian libtk-img_1.3-release-7+lenny1_s390.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-release-7+lenny1_s390.deb
Debian Linux 5.0 hppa
-
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb
Debian Linux 4.0 sparc
-
Debian libtk-img_1.3-15etch3_sparc.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-15etch3_sparc.deb
Debian Linux 4.0 s/390
-
Debian libtk-img_1.3-15etch3_s390.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-15etch3_s390.deb
Debian Linux 5.0 m68k
-
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb
Debian Linux 5.0 arm
-
Debian libtk-img-dev_1.3-release-7+lenny1_arm.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- dev_1.3-release-7+lenny1_arm.deb -
Debian libtk-img-doc_1.3-release-7+lenny1_all.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img- doc_1.3-release-7+lenny1_all.deb -
Debian libtk-img_1.3-release-7+lenny1_arm.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-release-7+lenny1_arm.deb
Debian Linux 4.0 alpha
-
Debian libtk-img_1.3-15etch3_alpha.deb
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_ 1.3-15etch3_alpha.deb
TCL/TK TCL/TK 8.0
-
TCL/TK tcl8416-src.zip
http://prdownloads.sourceforge.net/tcl/tcl8416-src.zip
TCL/TK TCL/TK 8.4.15
-
TCL/TK tcl8416-src.zip
http://prdownloads.sourceforge.net/tcl/tcl8416-src.zip
TCL/TK TCL/TK 8.4.2
-
TCL/TK tcl8416-src.zip
http://prdownloads.sourceforge.net/tcl/tcl8416-src.zip
TCL/TK TCL/TK 8.4.3
-
TCL/TK tcl8416-src.zip
http://prdownloads.sourceforge.net/tcl/tcl8416-src.zip
References
Tcl/Tk ReadImage Buffer Overflow Vulnerability
References:
References:
- Tcl/Tk Home Page (Tcl/Tk)
- Release Name: 8.4.16 (Tcl/Tk)
- RHSA-2008:0136-1 tk security update (Red Hat)