Vulnerability Name:

CVE-2007-0771 (CCN-34128)

Assigned:2007-02-12
Published:2007-02-12
Updated:2017-10-11
Summary:The utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a denial of service (system hang) related to "MT exec + utrace_attach spin failure mode," as demonstrated by ptrace-thrash.c.
CVSS v3 Severity:6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
3.7 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2007-0771

Source: CCN
Type: The Linux Kernel Archives Web site
The Linux Kernel Archives

Source: OSVDB
Type: UNKNOWN
35927

Source: CCN
Type: RHSA-2007-0169
Important: kernel security and bug fix update

Source: SECUNIA
Type: Vendor Advisory
25080

Source: CCN
Type: SECTRACK ID: 1017979
Linux Kernel utrace Bug Lets Local Users Deny Service

Source: SECTRACK
Type: UNKNOWN
1017979

Source: CCN
Type: OSVDB ID: 35927
Linux Kernel utrace Support Unspecified Local DoS

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2007:0169

Source: BID
Type: UNKNOWN
23720

Source: CCN
Type: BID-23720
Linux Kernel UTrace Unspecified Local Denial of Service Vulnerability

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=227952

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=228816

Source: XF
Type: UNKNOWN
kernel-utracesupport-dos(34128)

Source: XF
Type: UNKNOWN
kernel-utracesupport-dos(34128)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9447

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:2.6.18:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.18:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:21770
    P
    ELSA-2007:0169: kernel security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:9447
    V
    The utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a denial of service (system hang) related to "MT exec + utrace_attach spin failure mode," as demonstrated by ptrace-thrash.c.
    2013-04-29
    oval:com.redhat.rhsa:def:20070169
    P
    RHSA-2007:0169: kernel security and bug fix update (Important)
    2007-04-30
    BACK
    linux linux kernel 2.6.18
    linux linux kernel 2.6.18 rc1
    linux linux kernel 2.6.18 rc2
    linux linux kernel 2.6.18 rc3
    linux linux kernel 2.6.18 rc4
    linux linux kernel 2.6.18 rc5
    linux linux kernel 2.6.18 rc6
    linux linux kernel 2.6.18 rc7
    linux linux kernel 2.6.18.1
    linux linux kernel 2.6.18.2
    linux linux kernel 2.6.18.3
    linux linux kernel 2.6.18.4
    redhat enterprise linux 5.0
    redhat enterprise linux 5.0
    redhat enterprise linux 5.0
    linux linux kernel 2.6.18
    linux linux kernel 2.6.18 rc5
    linux linux kernel 2.6.18 rc2
    linux linux kernel 2.6.18 rc1
    linux linux kernel 2.6.18.1
    linux linux kernel 2.6.18.2
    linux linux kernel 2.6.18.3
    linux linux kernel 2.6.18.4
    linux linux kernel 2.6.18 rc3
    linux linux kernel 2.6.18 rc4
    linux linux kernel 2.6.18 rc6
    linux linux kernel 2.6.18 rc7
    redhat enterprise linux desktop 5.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    redhat enterprise linux 5