VYPR
Unrated severityNVD Advisory· Published Feb 7, 2008· Updated Apr 23, 2026

CVE-2008-0553

CVE-2008-0553

Description

Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.

Affected products

69
  • Tcl Tk/Tcl Tk69 versions
    cpe:2.3:a:tcl_tk:tcl_tk:*:*:*:*:*:*:*:*+ 68 more
    • cpe:2.3:a:tcl_tk:tcl_tk:*:*:*:*:*:*:*:*range: <=8.4.17
    • cpe:2.3:a:tcl_tk:tcl_tk:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:4.0p1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:6.1p1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:6.2:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:6.4:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:6.5:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:6.6:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:6.7:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:7.1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:7.4:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:7.5:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:7.5p1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:7.6:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:7.6p2:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.0p2:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.12:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.13:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.14:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.15:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.16:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.5:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.6:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4a2:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4a3:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4a4:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4b1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.4b2:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5a1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5a2:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5_a3:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5a3:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5a4:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5a5:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5a6:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5b1:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5b2:*:*:*:*:*:*:*
    • cpe:2.3:a:tcl_tk:tcl_tk:8.5b3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

44

News mentions

0

No linked articles in our index yet.