First published: Wed Aug 08 2007(Updated: )
icat in Brian Carrier The Sleuth Kit (TSK) before 2.09 omits NULL pointer checks in certain code paths, which allows user-assisted remote attackers to cause a denial of service (NULL dereference and application crash) and prevent examination of certain NTFS files via a malformed NTFS image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Brian Carrier The slueth Kit | <=2.08 | |
The Sleuth Kit | <=2.08 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2007-4197 is classified as high due to potential denial of service vulnerabilities.
To fix CVE-2007-4197, update The Sleuth Kit to version 2.09 or later, which addresses the NULL pointer check issue.
CVE-2007-4197 can be exploited by user-assisted remote attackers to crash the application using a malformed NTFS image.
CVE-2007-4197 affects versions of The Sleuth Kit prior to 2.09, specifically up to and including version 2.08.
The impact of CVE-2007-4197 is a denial of service, resulting in application crashes and the inability to examine certain NTFS files.