CVE-2007-1667

NameCVE-2007-1667
DescriptionMultiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-1294-1, DSA-1858-1, DSA-1903-1
NVD severityhigh (attack range: remote)
Debian Bugs414045, 414046, 417862

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
graphicsmagick (PTS)wheezy1.3.16-1.1fixed
wheezy (security)1.3.16-1.1+deb7u15fixed
jessie1.3.20-3+deb8u1fixed
jessie (security)1.3.20-3+deb8u2fixed
stretch1.3.25-8fixed
buster1.3.26-19fixed
sid1.3.27-1fixed
imagemagick (PTS)wheezy8:6.7.7.10-5+deb7u4fixed
wheezy (security)8:6.7.7.10-5+deb7u18fixed
jessie (security), jessie8:6.8.9.9-5+deb8u11fixed
stretch (security), stretch8:6.9.7.4+dfsg-11+deb9u3fixed
buster, sid8:6.9.7.4+dfsg-16fixed
libx11 (PTS)wheezy2:1.5.0-1+deb7u2fixed
wheezy (security)2:1.5.0-1+deb7u4fixed
jessie2:1.6.2-3+deb8u1fixed
buster, sid, stretch2:1.6.4-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
graphicsmagicksource(unstable)1.1.7-14medium417862
graphicsmagicksourceetch1.1.7-13+etch1highDSA-1903-1
graphicsmagicksourcelenny1.1.11-3.2+lenny1highDSA-1903-1
imagemagicksource(unstable)7:6.2.4.5.dfsg1-1medium
imagemagicksourceetch7:6.2.4.5.dfsg1-0.15+etch1highDSA-1858-1
imagemagicksourcelenny7:6.3.7.9.dfsg2-1~lenny3highDSA-1858-1
libx11source(unstable)2:1.0.3-7medium414045
xfree86source(unstable)(unfixed)medium414046
xfree86sourcesarge4.3.0.dfsg.1-14sarge4highDSA-1294-1

Notes

Discovered through CVE-2007-0770.
With certain mail user agents, this issue is likely exploitable
without much user interaction.

Search for package or bug name: Reporting problems