Vulnerability Name: | CVE-2007-5690 | ||||||||
Assigned: | 2007-10-29 | ||||||||
Published: | 2007-10-29 | ||||||||
Updated: | 2018-10-15 | ||||||||
Summary: | ** DISPUTED ** Buffer overflow in sethdlc.c in the Asterisk Zaptel 1.4.5.1 might allow local users to gain privileges via a long device name (interface name) in the ifr_name field. Note: the vendor disputes this issue, stating that the application requires root access, so privilege boundaries are not crossed. | ||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | ALLOWS_OTHER_ACCESS | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-5690 Source: MISC Type: UNKNOWN http://downloads.digium.com/pub/asa/AST-2007-024.html Source: SREASON Type: UNKNOWN 3319 Source: MISC Type: UNKNOWN http://www.eleytt.com/advisories/eleytt_ZAPTEL.pdf Source: BUGTRAQ Type: UNKNOWN 20071020 [ELEYTT] Public Advisory 20-10-2007 Source: BUGTRAQ Type: UNKNOWN 20071108 AST-2007-024 - Fallacious security advisory spread on the Internet involving buffer overflow in Zaptel's sethdlc application Source: BID Type: UNKNOWN 26160 Source: SECTRACK Type: UNKNOWN 1018885 Source: XF Type: UNKNOWN zaptel-sethdlc-bo(37335) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |