CVE-2008-0553

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.

References

http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html

http://secunia.com/advisories/28784

http://secunia.com/advisories/28807

http://secunia.com/advisories/28848

http://secunia.com/advisories/28857

http://secunia.com/advisories/28867

http://secunia.com/advisories/28954

http://secunia.com/advisories/29069

http://secunia.com/advisories/29070

http://secunia.com/advisories/29622

http://secunia.com/advisories/30129

http://secunia.com/advisories/30188

http://secunia.com/advisories/30535

http://secunia.com/advisories/30717

http://secunia.com/advisories/30783

http://secunia.com/advisories/32608

http://securitytracker.com/id?1019309

http://sourceforge.net/project/shownotes.php?release_id=573933&group_id=10894

http://sunsolve.sun.com/search/document.do?assetkey=1-26-237465-1

http://ubuntu.com/usn/usn-664-1

http://wiki.rpath.com/Advisories:rPSA-2008-0054

http://www.debian.org/security/2008/dsa-1490

http://www.debian.org/security/2008/dsa-1491

http://www.debian.org/security/2008/dsa-1598

http://www.mandriva.com/security/advisories?name=MDVSA-2008:041

http://www.novell.com/linux/security/advisories/2008_13_sr.html

http://www.redhat.com/support/errata/RHSA-2008-0134.html

http://www.redhat.com/support/errata/RHSA-2008-0135.html

http://www.redhat.com/support/errata/RHSA-2008-0136.html

http://www.securityfocus.com/archive/1/488069/100/0/threaded

http://www.securityfocus.com/archive/1/493080/100/0/threaded

http://www.securityfocus.com/bid/27655

http://www.vmware.com/security/advisories/VMSA-2008-0009.html

http://www.vupen.com/english/advisories/2008/0430

http://www.vupen.com/english/advisories/2008/1456/references

http://www.vupen.com/english/advisories/2008/1744

https://bugzilla.redhat.com/show_bug.cgi?id=431518

https://issues.rpath.com/browse/RPL-2215

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10098

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00115.html

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00132.html

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00193.html

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00205.html

https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00116.html

Details

Source: MITRE

Published: 2008-02-07

Updated: 2018-10-15

Type: CWE-119

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:tcl_tk:tcl_tk:2.1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:3.3:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:4.0p1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:6.1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:6.1p1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:6.2:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:6.4:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:6.5:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:6.6:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:6.7:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:7.0:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:7.1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:7.3:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:7.4:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:7.5:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:7.5p1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:7.6:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:7.6p2:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.0:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.0.3:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.0.4:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.0.5:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.0p2:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.1.1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.2.0:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.2.1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.2.2:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.2.3:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.3.0:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.3.1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.3.2:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.3.3:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.3.4:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.3.5:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.0:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.2:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.3:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.4:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.5:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.6:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.7:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.8:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.9:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.10:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.11:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.12:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.13:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.14:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.15:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4.16:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:*:*:*:*:*:*:*:* versions up to 8.4.17 (inclusive)

cpe:2.3:a:tcl_tk:tcl_tk:8.4a2:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4a3:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4a4:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4b1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.4b2:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5.0:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5_a3:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5a1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5a2:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5a3:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5a4:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5a5:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5a6:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5b1:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5b2:*:*:*:*:*:*:*

cpe:2.3:a:tcl_tk:tcl_tk:8.5b3:*:*:*:*:*:*:*

Tenable Plugins

View all (33 total)

IDNameProductFamilySeverity
79961GLSA-201412-08 : Multiple packages, Multiple vulnerabilities fixed in 2010NessusGentoo Local Security Checks
critical
67655Oracle Linux 5 : tk (ELSA-2008-0136)NessusOracle Linux Local Security Checks
medium
67654Oracle Linux 4 : tk (ELSA-2008-0135)NessusOracle Linux Local Security Checks
medium
67653Oracle Linux 3 : tcltk (ELSA-2008-0134)NessusOracle Linux Local Security Checks
medium
60363Scientific Linux Security Update : tk on SL4.x, SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60362Scientific Linux Security Update : tcltk on SL3.x i386/x86_64NessusScientific Linux Local Security Checks
medium
41195SuSE9 Security Update : Tk (YOU Patch Number 12071)NessusSuSE Local Security Checks
medium
40378VMSA-2008-0009 : Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issuesNessusVMware ESX Local Security Checks
high
37631Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : tk8.0, tk8.3, tk8.4 vulnerability (USN-664-1)NessusUbuntu Local Security Checks
medium
36297Mandriva Linux Security Advisory : tk (MDVSA-2008:041)NessusMandriva Local Security Checks
medium
33230Debian DSA-1598-1 : libtk-img - buffer overflowNessusDebian Local Security Checks
medium
33123openSUSE 10 Security Update : tkimg (tkimg-5328)NessusSuSE Local Security Checks
medium
33122openSUSE 10 Security Update : tkimg (tkimg-5320)NessusSuSE Local Security Checks
medium
32328Fedora 9 : tkimg-1.3-0.10.20080505svn.fc9 (2008-3621)NessusFedora Local Security Checks
medium
32205Fedora 7 : tkimg-1.3-0.8.20080505svn.fc7 (2008-3545)NessusFedora Local Security Checks
medium
31847SuSE 10 Security Update : Tk (ZYPP Patch Number 4974)NessusSuSE Local Security Checks
medium
31846openSUSE 10 Security Update : tk (tk-4973)NessusSuSE Local Security Checks
medium
31162RHEL 5 : tk (RHSA-2008:0136)NessusRed Hat Local Security Checks
medium
31161RHEL 4 : tk (RHSA-2008:0135)NessusRed Hat Local Security Checks
medium
31160RHEL 2.1 / 3 : tcltk (RHSA-2008:0134)NessusRed Hat Local Security Checks
medium
31141CentOS 5 : tk (CESA-2008:0136)NessusCentOS Local Security Checks
medium
31140CentOS 4 : tk (CESA-2008:0135)NessusCentOS Local Security Checks
medium
31139CentOS 3 : tcltk (CESA-2008:0134)NessusCentOS Local Security Checks
medium
30239Fedora 7 : perl-Tk-804.028-3.fc7 (2008-1384)NessusFedora Local Security Checks
medium
30238Fedora 8 : perl-Tk-804.028-3.fc8 (2008-1323)NessusFedora Local Security Checks
medium
30235Fedora 7 : tk-8.4.13-7.fc7 (2008-1131)NessusFedora Local Security Checks
medium
30234Fedora 8 : tk-8.4.17-2.fc8 (2008-1122)NessusFedora Local Security Checks
medium
30230Debian DSA-1491-1 : tk8.4 - buffer overflowNessusDebian Local Security Checks
medium
30229Debian DSA-1490-1 : tk8.3 - buffer overflowNessusDebian Local Security Checks
medium
28339Debian DSA-1416-1 : tk8.3 - buffer overflowNessusDebian Local Security Checks
medium
28338Debian DSA-1415-1 : tk8.4 - buffer overflowNessusDebian Local Security Checks
medium
28134Ubuntu 6.06 LTS / 6.10 / 7.04 : tk8.3, tk8.4 vulnerability (USN-529-1)NessusUbuntu Local Security Checks
medium
27519Mandrake Linux Security Advisory : tk (MDKSA-2007:200)NessusMandriva Local Security Checks
medium