Unrated severityNVD Advisory· Published Dec 7, 2007· Updated Apr 23, 2026
CVE-2007-5497
CVE-2007-5497
Description
Multiple integer overflows in libext2fs in e2fsprogs before 1.40.3 allow user-assisted remote attackers to execute arbitrary code via a crafted filesystem image.
Affected products
42cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:*:*:*:*:*:*:*:*+ 40 more
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:*:*:*:*:*:*:*:*range: <=1.40.2
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.02:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.03:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.04:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.05:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.06:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.07:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.08:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.09:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.10:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.11:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.12:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.13:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.14:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.15:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.16:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.17:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.18:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.19:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.20:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.21:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.22:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.23:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.24:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.25:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.26:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.27:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.28:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.29:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.30:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.31:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.32:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.33:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.34:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.35:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.36:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.37:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.38:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.39:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.40:*:*:*:*:*:*:*
- cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.40.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
36- secunia.com/advisories/27889nvdVendor Advisory
- secunia.com/advisories/27965nvdVendor Advisory
- secunia.com/advisories/27987nvdVendor Advisory
- secunia.com/advisories/28000nvdVendor Advisory
- secunia.com/advisories/28030nvdVendor Advisory
- secunia.com/advisories/28042nvdVendor Advisory
- secunia.com/advisories/28360nvdVendor Advisory
- secunia.com/advisories/28541nvdVendor Advisory
- secunia.com/advisories/28648nvdVendor Advisory
- secunia.com/advisories/29224nvdVendor Advisory
- secunia.com/advisories/40551nvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2008-0003.htmlnvdVendor Advisory
- www.vupen.com/english/advisories/2007/4135nvdVendor Advisory
- www.vupen.com/english/advisories/2008/0761nvdVendor Advisory
- www.vupen.com/english/advisories/2010/1796nvdVendor Advisory
- itrc.hp.com/service/cki/docDisplay.donvd
- lists.vmware.com/pipermail/security-announce/2008/000007.htmlnvd
- secunia.com/advisories/32774nvd
- sourceforge.net/project/shownotes.phpnvd
- support.avaya.com/elmodocs2/security/ASA-2008-040.htmnvd
- support.citrix.com/article/CTX118766nvd
- wiki.rpath.com/Advisories:rPSA-2007-0262nvd
- www.debian.org/security/2007/dsa-1422nvd
- www.mandriva.com/security/advisoriesnvd
- www.novell.com/linux/security/advisories/2007_25_sr.htmlnvd
- www.securityfocus.com/archive/1/487999/100/0/threadednvd
- www.securityfocus.com/archive/1/489082/100/0/threadednvd
- www.securityfocus.com/bid/26772nvd
- www.securitytracker.com/idnvd
- www.ubuntu.com/usn/usn-555-1nvd
- www.vmware.com/security/advisories/VMSA-2008-0004.htmlnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/38903nvd
- issues.rpath.com/browse/RPL-2011nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10399nvd
- www.redhat.com/archives/fedora-package-announce/2008-January/msg00618.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2008-January/msg00629.htmlnvd
News mentions
0No linked articles in our index yet.