ID |
CVE-2007-5730
|
Summary |
Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
|
CVSS |
Base: | 7.2 (as of 15-12-2020 - 23:48) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-787 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
oval
via4
|
accepted | 2013-04-29T04:00:04.898-04:00 | class | vulnerability | contributors | name | Aharon Chernin | organization | SCAP.com, LLC |
name | Dragos Prisaca | organization | G2, Inc. |
| definition_extensions | comment | The operating system installed on the system is Red Hat Enterprise Linux 5 | oval | oval:org.mitre.oval:def:11414 |
comment | The operating system installed on the system is CentOS Linux 5.x | oval | oval:org.mitre.oval:def:15802 |
comment | Oracle Linux 5.x | oval | oval:org.mitre.oval:def:15459 |
| description | Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability. | family | unix | id | oval:org.mitre.oval:def:10000 | status | accepted | submitted | 2010-07-09T03:56:16-04:00 | title | Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability. | version | 18 |
|
redhat
via4
|
advisories | | rpms | - xen-0:3.0.3-41.el5_1.5
- xen-debuginfo-0:3.0.3-41.el5_1.5
- xen-devel-0:3.0.3-41.el5_1.5
- xen-libs-0:3.0.3-41.el5_1.5
|
|
refmap
via4
|
bid | 23731 | debian | DSA-1284 | mandriva | - MDKSA-2007:203
- MDVSA-2008:162
| misc | http://taviso.decsystem.org/virtsec.pdf | osvdb | 42985 | secunia | - 25073
- 25095
- 27486
- 29129
- 29963
| vim | 20071030 Clarification on old QEMU/NE2000/Xen issues | vupen | ADV-2007-1597 | xf | qemu-net-socket-bo(38239) |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2007-11-02 | organization | Red Hat | statement | Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5729
The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. |
|
Last major update |
15-12-2020 - 23:48 |
Published |
30-10-2007 - 22:46 |
Last modified |
15-12-2020 - 23:48 |