CVE-2007-6613

GNU Compact Disc Input and Control Library <0.79 - Buffer Overflow

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-6613. PoCs published by Devon Miller.

AI-analyzed exploit summary The provided text describes a buffer overflow vulnerability in libcdio 0.79, where specially crafted ISO files can trigger overflows in 'cd-info' and 'iso-info' programs. It includes steps to reproduce the issue but lacks actual exploit code.

Description

Stack-based buffer overflow in the print_iso9660_recurse function in iso-info (src/iso-info.c) in GNU Compact Disc Input and Control Library (libcdio) 0.79 and earlier allows context-dependent attackers to cause a denial of service (core dump) and possibly execute arbitrary code via a disk or image that contains a long joilet file name.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Devon Miller · textdoslinux
https://www.exploit-db.com/exploits/30985

The provided text describes a buffer overflow vulnerability in libcdio 0.79, where specially crafted ISO files can trigger overflows in 'cd-info' and 'iso-info' programs. It includes steps to reproduce the issue but lacks actual exploit code.

Classification
Writeup 90%
Attack Type
Rce
Complexity
Moderate
Reliability
Theoretical
Target: libcdio 0.79
No auth needed
Prerequisites: Ability to create a malicious ISO file · Victim interaction to process the ISO file
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (15)

Core 15
Core References
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-580-1
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29242
Exploit, Patch x_refsource_confirm
http://bugs.gentoo.org/show_bug.cgi?id=203777
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28308
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/0030
Various Sources mailing-list x_refsource_mlist
http://lists.gnu.org/archive/html/libcdio-devel/2007-12/msg00009.html
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200801-08.xml
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27131
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:037
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39405
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28970
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28796
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28569

Scores

EPSS 0.2298
EPSS Percentile 96.0%

Details

CWE
CWE-119
Status published
Products (1)
gnu/libcdio < 0.79
Published Jan 03, 2008
Tracked Since Feb 18, 2026