Vulnerability CVE-2007-5730


Published: 2007-10-30   Modified: 2012-02-12

Description:
Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.

CVSS2 => (AV:L/AC:M/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.6/10
10/10
2.7/10
Exploit range
Attack complexity
Authentication
Local
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Fabrice bellard -> QEMU 

 References:
http://taviso.decsystem.org/virtsec.pdf
http://www.attrition.org/pipermail/vim/2007-October/001842.html
http://www.debian.org/security/2007/dsa-1284
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
http://www.redhat.com/support/errata/RHSA-2008-0194.html
http://www.securityfocus.com/bid/23731
http://www.vupen.com/english/advisories/2007/1597
https://exchange.xforce.ibmcloud.com/vulnerabilities/38239
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000

Copyright 2024, cxsecurity.com

 

Back to Top