CVE-2007-5497
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
07/12/2007
Last modified:
09/04/2025
Description
Multiple integer overflows in libext2fs in e2fsprogs before 1.40.3 allow user-assisted remote attackers to execute arbitrary code via a crafted filesystem image.
Impact
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:*:*:*:*:*:*:*:* | 1.40.2 (including) | |
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.03:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.04:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.05:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.06:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.07:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.08:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.09:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.15:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://lists.vmware.com/pipermail/security-announce/2008/000007.html
- http://secunia.com/advisories/27889
- http://secunia.com/advisories/27965
- http://secunia.com/advisories/27987
- http://secunia.com/advisories/28000
- http://secunia.com/advisories/28030
- http://secunia.com/advisories/28042
- http://secunia.com/advisories/28360
- http://secunia.com/advisories/28541
- http://secunia.com/advisories/28648
- http://secunia.com/advisories/29224
- http://secunia.com/advisories/32774
- http://secunia.com/advisories/40551
- http://sourceforge.net/project/shownotes.php?release_id=560230&group_id=2406
- http://support.avaya.com/elmodocs2/security/ASA-2008-040.htm
- http://support.citrix.com/article/CTX118766
- http://wiki.rpath.com/Advisories:rPSA-2007-0262
- http://www.debian.org/security/2007/dsa-1422
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A242
- http://www.novell.com/linux/security/advisories/2007_25_sr.html
- http://www.redhat.com/support/errata/RHSA-2008-0003.html
- http://www.securityfocus.com/archive/1/487999/100/0/threaded
- http://www.securityfocus.com/archive/1/489082/100/0/threaded
- http://www.securityfocus.com/bid/26772
- http://www.securitytracker.com/id?1019537=
- http://www.ubuntu.com/usn/usn-555-1
- http://www.vmware.com/security/advisories/VMSA-2008-0004.html
- http://www.vupen.com/english/advisories/2007/4135
- http://www.vupen.com/english/advisories/2008/0761
- http://www.vupen.com/english/advisories/2010/1796
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38903
- https://issues.rpath.com/browse/RPL-2011
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10399
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00618.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00629.html
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://lists.vmware.com/pipermail/security-announce/2008/000007.html
- http://secunia.com/advisories/27889
- http://secunia.com/advisories/27965
- http://secunia.com/advisories/27987
- http://secunia.com/advisories/28000
- http://secunia.com/advisories/28030
- http://secunia.com/advisories/28042
- http://secunia.com/advisories/28360
- http://secunia.com/advisories/28541
- http://secunia.com/advisories/28648
- http://secunia.com/advisories/29224
- http://secunia.com/advisories/32774
- http://secunia.com/advisories/40551
- http://sourceforge.net/project/shownotes.php?release_id=560230&group_id=2406
- http://support.avaya.com/elmodocs2/security/ASA-2008-040.htm
- http://support.citrix.com/article/CTX118766
- http://wiki.rpath.com/Advisories:rPSA-2007-0262
- http://www.debian.org/security/2007/dsa-1422
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A242
- http://www.novell.com/linux/security/advisories/2007_25_sr.html
- http://www.redhat.com/support/errata/RHSA-2008-0003.html
- http://www.securityfocus.com/archive/1/487999/100/0/threaded
- http://www.securityfocus.com/archive/1/489082/100/0/threaded
- http://www.securityfocus.com/bid/26772
- http://www.securitytracker.com/id?1019537=
- http://www.ubuntu.com/usn/usn-555-1
- http://www.vmware.com/security/advisories/VMSA-2008-0004.html
- http://www.vupen.com/english/advisories/2007/4135
- http://www.vupen.com/english/advisories/2008/0761
- http://www.vupen.com/english/advisories/2010/1796
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38903
- https://issues.rpath.com/browse/RPL-2011
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10399
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00618.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00629.html



