VYPR
Unrated severityNVD Advisory· Published Sep 27, 2007· Updated Apr 23, 2026

CVE-2007-5133

CVE-2007-5133

Description

Microsoft Windows Explorer (explorer.exe) allows user-assisted remote attackers to cause a denial of service (CPU consumption) via a certain PNG file with a large tEXt chunk that possibly triggers an integer overflow in PNG chunk size handling, as demonstrated by badlycrafted.png.

Affected products

71
  • cpe:2.3:a:3ware:3dm_disk_management_software:*:sp1:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:3ware:3dm_disk_management_software:*:sp1:*:*:*:*:*:*
    • cpe:2.3:a:3ware:3dm_disk_management_software:*:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:*:*:*:*+ 25 more
    • cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:gold:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:gold:itanium:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:gold:std:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:gold:wed:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:gold:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:gold:x64-std:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:*:itanium:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:r2:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:r2:std:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:r2:wed:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:r2:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:r2:x64-std:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp1:std:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp1:wed:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp2:std:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp2:wed:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:*:std:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:*:wed:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:*:x64-std:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:*:xp-64bit:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2003:*:-:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*+ 12 more
    • cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:*:business:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:*:enterprise:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:*:home_basic:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:*:home_premium:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:*:starter:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:*:ultimate:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:*:x64-business:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:*:x64-home_basic:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*+ 25 more
    • cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:*:64bit:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:gold:embedded:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:gold:media_center:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:gold:pro:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:gold:tablet_pc:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:*:ibm_oem:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:*:pro:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp1:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp1:64bit:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp1:ibm_oem:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp1:pro:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp2:embedded:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp2:pro:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:*:tablet_pc:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.