NVD Vulnerability Detail
Search Exploit, PoC
CVE-2007-4037
Summary

Guidance Software EnCase allows user-assisted attackers to trigger a buffer over-read and application crash via a malformed NTFS filesystem containing a modified FILE record with a certain large offset. NOTE: the vendor disputes the significance of this issue, asserting that relevant attackers typically do not corrupt a filesystem, and indicating that the relevant read operation can be disabled

Publication Date July 28, 2007, 7:30 a.m.
Registration Date Jan. 29, 2021, 2:17 p.m.
Last Update Aug. 8, 2024, 12:15 a.m.
CVSS2.0 : MEDIUM
Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:N/A:P
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C) なし
完全性への影響(I) なし
可用性への影響(A)
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required はい
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:guidance_software:encase:*:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
guidance software の encase におけるバッファエラーの脆弱性
Title guidance software の encase におけるバッファエラーの脆弱性
Summary

guidance software の encase には、バッファエラーの脆弱性が存在します。

Possible impacts
Solution

参考情報を参照して適切な対策を実施してください。

Publication Date July 27, 2007, midnight
Registration Date July 25, 2024, 11:10 a.m.
Last Update July 25, 2024, 11:10 a.m.
Affected System
guidance software
encase 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
その他
Change Log
No Changed Details Date of change
1 [2024年07月25日]
  掲載
July 25, 2024, 11:10 a.m.