CVE-2007-0803

N/A Unknown
Published: February 07, 2007 Modified: April 23, 2026
View on NVD

Description

Multiple buffer overflows in STLport before 5.0.3 allow remote attackers to execute arbitrary code via unspecified vectors relating to (1) "print floats" and (2) a missing null termination in the "rope constructor."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/33106
Source: cve@mitre.org
Broken Link
http://osvdb.org/33107
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/24024
Source: cve@mitre.org
Not Applicable Vendor Advisory
http://secunia.com/advisories/24428
Source: cve@mitre.org
Not Applicable
http://security.gentoo.org/glsa/glsa-200703-07.xml
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/22423
Source: cve@mitre.org
Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.vupen.com/english/advisories/2007/0498
Source: cve@mitre.org
Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/32242
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/32244
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://osvdb.org/33106
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/33107
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24024
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable Vendor Advisory
http://secunia.com/advisories/24428
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://security.gentoo.org/glsa/glsa-200703-07.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://sourceforge.net/project/shownotes.php?release_id=483468
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.securityfocus.com/bid/22423
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.vupen.com/english/advisories/2007/0498
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/32242
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/32244
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

20 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
7.4%
92th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

stlport_project