Vulnerability Name:

CVE-2007-5729 (CCN-38238)

Assigned:2007-10-30
Published:2007-10-30
Updated:2020-12-15
Summary:The NE2000 emulator in QEMU 0.8.2 allows local users to execute arbitrary code by writing Ethernet frames with a size larger than the MTU to the EN0_TCNT register, which triggers a heap-based buffer overflow in the slirp library, aka NE2000 "mtu" heap overflow.
Note: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the mtu overflow vulnerability.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-5729

Source: CCN
Type: QEMU Web site
QEMU

Source: SUSE
Type: Mailing List, Third Party Advisory
SUSE-SR:2009:002

Source: OSVDB
Type: Broken Link
42986

Source: CCN
Type: SA25073
QEMU Various Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
25073

Source: SECUNIA
Type: Third Party Advisory
25095

Source: SECUNIA
Type: Third Party Advisory
27486

Source: CCN
Type: SA29129
KVM Block Device Backend Security Bypass

Source: SECUNIA
Type: Third Party Advisory
29129

Source: SECUNIA
Type: Third Party Advisory
33568

Source: MISC
Type: Technical Description, Third Party Advisory
http://taviso.decsystem.org/virtsec.pdf

Source: VIM
Type: Third Party Advisory
20071030 Clarification on old QEMU/NE2000/Xen issues

Source: DEBIAN
Type: Third Party Advisory
DSA-1284

Source: MANDRIVA
Type: Third Party Advisory
MDKSA-2007:203

Source: MANDRIVA
Type: Third Party Advisory
MDVSA-2008:162

Source: CCN
Type: OSVDB ID: 35495
QEMU NE2000 Network Driver Ethernet Frame Handling Overflow

Source: CCN
Type: OSVDB ID: 42986
QEMU NE2000 Emulator slirp Library Local Overflow

Source: BID
Type: Third Party Advisory, VDB Entry
23731

Source: CCN
Type: BID-23731
QEMU Multiple Local Vulnerabilities

Source: VUPEN
Type: Third Party Advisory
ADV-2007-1597

Source: XF
Type: Third Party Advisory, VDB Entry
qemu-ne2000-code-execution(38238)

Source: XF
Type: UNKNOWN
qemu-ne2000-code-execution(38238)

Source: SUSE
Type: SUSE-SR:2009:002
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:qemu:qemu:0.8.2:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:fabrice_bellard:qemu:0.8.2:*:*:*:*:*:*:*
  • AND
  • cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20075729
    V
    CVE-2007-5729
    2022-05-20
    BACK
    qemu qemu 0.8.2
    debian debian linux 3.1
    debian debian linux 4.0
    opensuse opensuse 11.0
    opensuse opensuse 11.1
    fabrice_bellard qemu 0.8.2
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.1