Vulnerability Name: CVE-2007-5730 (CCN-38239) Assigned: 2007-10-23 Published: 2007-10-23 Updated: 2020-12-15 Summary: Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. Note : some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability. CVSS v3 Severity: 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P )3.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-787 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2007-5730 Source: CCN Type: QEMU Web siteQEMU Source: OSVDB Type: Broken Link42985 Source: CCN Type: RHSA-2008-0194Important: xen security and bug fix update Source: CCN Type: SA25073QEMU Various Vulnerabilities Source: SECUNIA Type: Third Party Advisory, Vendor Advisory25073 Source: SECUNIA Type: Third Party Advisory25095 Source: SECUNIA Type: Third Party Advisory27486 Source: CCN Type: SA29129KVM Block Device Backend Security Bypass Source: SECUNIA Type: Third Party Advisory29129 Source: SECUNIA Type: Third Party Advisory29963 Source: MISC Type: Technical Description, Third Party Advisoryhttp://taviso.decsystem.org/virtsec.pdf Source: VIM Type: Third Party Advisory20071030 Clarification on old QEMU/NE2000/Xen issues Source: DEBIAN Type: Third Party AdvisoryDSA-1284 Source: MANDRIVA Type: Third Party AdvisoryMDKSA-2007:203 Source: MANDRIVA Type: Third Party AdvisoryMDVSA-2008:162 Source: CCN Type: OSVDB ID: 42985QEMU net socket listen Option Local Overflow Source: REDHAT Type: Third Party AdvisoryRHSA-2008:0194 Source: BID Type: Third Party Advisory, VDB Entry23731 Source: CCN Type: BID-23731QEMU Multiple Local Vulnerabilities Source: VUPEN Type: Third Party AdvisoryADV-2007-1597 Source: XF Type: Third Party Advisory, VDB Entryqemu-net-socket-bo(38239) Source: XF Type: UNKNOWNqemu-net-socket-bo(38239) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:10000 Vulnerable Configuration: Configuration 1 :cpe:/a:qemu:qemu:0.8.2:*:*:*:*:*:*:* AND cpe:/o:xen:xen:*:*:*:*:*:*:*:* Configuration 2 :cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/a:redhat:rhel_virtualization:5:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/a:redhat:rhel_virtualization:5::client:*:*:*:*:* Configuration RedHat 3 :cpe:/a:redhat:rhel_virtualization:5::server:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:fabrice_bellard:qemu:0.8.2:*:*:*:*:*:*:* AND cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_virtualization:5:*:server:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:22720 P ELSA-2008:0194: xen security and bug fix update (Important) 2014-05-26 oval:org.mitre.oval:def:10000 V Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability. 2013-04-29 oval:com.redhat.rhsa:def:20080194 P RHSA-2008:0194: xen security and bug fix update (Important) 2008-05-13
BACK
qemu qemu 0.8.2
xen xen *
debian debian linux 3.1
debian debian linux 4.0
fabrice_bellard qemu 0.8.2
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
redhat enterprise linux 5
redhat rhel virtualization 5
mandrakesoft mandrake linux 2007.1
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
mandrakesoft mandrake linux 2008.1 x86_64
mandrakesoft mandrake linux 2007.1
mandrakesoft mandrake linux 2008.1