Unrated severityNVD Advisory· Published Sep 18, 2007· Updated Apr 23, 2026
CVE-2007-4965
CVE-2007-4965
Description
Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
49- lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.htmlnvdExploit
- www.securityfocus.com/bid/25696nvdExploitThird Party AdvisoryVDB Entry
- bugs.gentoo.org/show_bug.cginvdThird Party Advisory
- docs.info.apple.com/article.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.htmlnvdThird Party Advisory
- lists.vmware.com/pipermail/security-announce/2008/000005.htmlnvdThird Party Advisory
- support.apple.com/kb/HT3438nvdThird Party Advisory
- support.avaya.com/css/P8/documents/100074697nvdThird Party Advisory
- wiki.rpath.com/wiki/Advisories:rPSA-2007-0254nvdThird Party Advisory
- www.debian.org/security/2008/dsa-1551nvdThird Party Advisory
- www.debian.org/security/2008/dsa-1620nvdThird Party Advisory
- www.gentoo.org/security/en/glsa/glsa-200711-07.xmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2007-1076.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2008-0629.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/487990/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/488457/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/507985/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-585-1nvdThird Party Advisory
- www.us-cert.gov/cas/techalerts/TA07-352A.htmlnvdThird Party AdvisoryUS Government Resource
- www.vmware.com/security/advisories/VMSA-2009-0016.htmlnvdThird Party Advisory
- issues.rpath.com/browse/RPL-1885nvdThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.htmlnvdThird Party Advisory
- lists.apple.com/archives/security-announce/2007/Dec/msg00002.htmlnvdMailing List
- lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlnvdMailing List
- secunia.com/advisories/26837nvdBroken Link
- secunia.com/advisories/27460nvdBroken Link
- secunia.com/advisories/27562nvdBroken Link
- secunia.com/advisories/27872nvdBroken Link
- secunia.com/advisories/28136nvdBroken Link
- secunia.com/advisories/28480nvdBroken Link
- secunia.com/advisories/28838nvdBroken Link
- secunia.com/advisories/29032nvdBroken Link
- secunia.com/advisories/29303nvdBroken Link
- secunia.com/advisories/29889nvdBroken Link
- secunia.com/advisories/31255nvdBroken Link
- secunia.com/advisories/31492nvdBroken Link
- secunia.com/advisories/33937nvdBroken Link
- secunia.com/advisories/37471nvdBroken Link
- secunia.com/advisories/38675nvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.vupen.com/english/advisories/2007/3201nvdBroken Link
- www.vupen.com/english/advisories/2007/4238nvdBroken Link
- www.vupen.com/english/advisories/2008/0637nvdBroken Link
- www.vupen.com/english/advisories/2009/3316nvdBroken Link
- exchange.xforce.ibmcloud.com/vulnerabilities/36653nvdVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804nvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486nvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496nvdBroken Link
News mentions
0No linked articles in our index yet.