CVE-2007-4758
Vulnerability from cvelistv5
Published
2007-09-08 10:00
Modified
2024-08-07 15:08
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in the image-processing APIs in Cosminexus Developer's Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:08:33.769Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html" }, { "name": "26538", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26538" }, { "name": "ADV-2007-3034", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3034" }, { "name": "37857", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37857" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html" }, { "name": "26538", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26538" }, { "name": "ADV-2007-3034", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3034" }, { "name": "37857", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37857" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html", "refsource": "CONFIRM", "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html" }, { "name": "26538", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26538" }, { "name": "ADV-2007-3034", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3034" }, { "name": "37857", "refsource": "OSVDB", "url": "http://osvdb.org/37857" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4758", "datePublished": "2007-09-08T10:00:00", "dateReserved": "2007-09-07T00:00:00", "dateUpdated": "2024-08-07T15:08:33.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-4758\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-09-08T10:17:00.000\",\"lastModified\":\"2011-03-08T02:59:08.643\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer en las APIs image-processing del Kit para Java: Cosminexus Developer\u0027s de Cosminexus 4 hasta 7 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio \u00f3 ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":10.0},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"F6FE70C8-749C-40A0-B087-14FDB6097CD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"2FE5D346-61E9-489B-9529-AA559E111DCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"E0E60F8E-0116-4215-8E52-1A663ECB834B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"4FAC97A3-04E7-425C-AD8F-B75838E975FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"5A9DA03E-0164-465C-A819-E3AA7A0ECD89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"F2FB1026-648E-4FF0-AE95-F5D3115CA67F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"3B1FFC3F-0948-446F-8539-D6362377DBFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2921E3C5-EF08-4612-B72E-7DABC0A8142E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_02:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"BD3A10B2-C904-45FD-9DAE-30DC00FA7326\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_03:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F6D8E1AA-B2CA-4029-8F25-35EEB0F15891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"48E93BDB-BB6D-4D1C-B3DD-3518E045F753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux:*:*:*:*:*\",\"matchCriteriaId\":\"82648C13-1D91-4C4C-A17B-64BCC5A24147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"12382EE9-4D34-4724-9023-5F6C48944F4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"8453ECF8-9419-4AD3-9541-B362FA58E4E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"B0316DD8-E2EB-4953-96BC-894B87D6C815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CD5BC0AF-7872-4FC3-91CE-78EB0AF481F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"4103CEB4-1EAD-4359-A519-A90DC885ABDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"803D406B-49B9-45C5-AA8E-86ACD1A7D5D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0F715E02-BCFE-46E9-B3EC-53A3B9207426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:7_20:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"B64A3CE1-C2DC-470C-BDFB-2242C3A5614D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:7_20_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"DFB8F345-6CA2-45FF-B583-BABB75A7947D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"1F7055A9-7A8A-4EB0-B202-220825B3FBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"4919D1DA-37C9-4C18-8F5B-C0BC6F6915D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"20ED59C6-CD06-4FE1-A484-A7E642F33AFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"58266C54-32FE-4E5D-94A8-4291A87208EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F7043AE7-5CB7-4A64-B4FA-DE4A9C393146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"5320D21A-C58E-47ED-8F7D-563F5A8E97CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:liniux:*:*:*:*:*\",\"matchCriteriaId\":\"253875EB-69D3-4D64-926A-71108AAF347F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"9535228E-72D4-4779-9A31-6F82D2B84B01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"5FBAAC3A-A4BD-4C12-85E4-D1535E7702BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_02:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"03E3C4E7-975C-4377-B2A7-EB5EB19F3C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_03:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"A8A86ABB-0383-4C45-9E97-BB4DCC5CCE66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"E24A1554-C2AB-4931-8D27-9225EFE7B6C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux:*:*:*:*:*\",\"matchCriteriaId\":\"930CA326-7B3E-4C46-8DD1-CB17CD0CC5FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"6511A0F9-6B01-49E1-8693-B6EC044DDB3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"0E5A504F-C4B1-44EC-A7AC-8690CF925B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"84BE463B-0A3E-477C-B912-966625887D65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"C4A7C88F-8B18-4D58-AC37-90E2AE658AEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:hpux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"317A5BF8-0663-4D1A-8172-B90B962E0466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"C5DF4BB1-43AE-4743-9F06-43B643D33EEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"42A988DB-2BA0-45B2-872C-D2A29CEA9FBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_20:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6C6D711C-6F5F-436E-BF01-E26864A5E887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_20_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"50F294FD-E70E-481A-809C-650320FEB9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"0CADDEE7-D529-4644-9A5F-6235AD072CCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"665CBCC5-7598-47C1-97F7-8FDF1A67E98F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_01:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"A823185B-DB4D-4076-9B41-5C0736C39EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"7EF49ED1-F86B-4F29-AC16-BDA1AEDD6FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_02:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"C0B5CCBA-6DAE-4F4A-8113-536D2DD1A2D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_03:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6F95EE9A-7567-45D4-8730-EC4F6D8FA540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"CED6A3B7-F58D-47BE-81DB-59AC0DFC7F41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"5B35D672-2560-4783-A74E-9FBDE3059A47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"E56AD9B5-404C-4B36-B625-15A69336B697\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10_01:*:linux_ipf:*:*:*:*:*\",\"matchCriteriaId\":\"4027CD44-E1E5-4CA3-AC5F-41A4B21B74AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"FC4633F6-5779-4196-B8AF-C3DD4089D43B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:07_20:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"C7FB7277-F1D3-4492-9CB2-95E0E8D3FACF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:ucosminexus_service_platform:7_20_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"B5B8AA9F-4D66-4A33-AF2C-95AAAEE2E917\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/37857\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/26538\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3034\",\"source\":\"cve@mitre.org\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.