Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-5730

Опубликовано: 23 окт. 2007
Источник: redhat
EPSS Низкий

Описание

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.

Отчет

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5729 The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=360381QEMU Buffer overflow via crafted "net socket listen" option

EPSS

Процентиль: 35%
0.00139
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.

nvd
больше 17 лет назад

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.

debian
больше 17 лет назад

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly ...

github
около 3 лет назад

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.

oracle-oval
около 17 лет назад

ELSA-2008-0194: xen security and bug fix update (IMPORTANT)

EPSS

Процентиль: 35%
0.00139
Низкий
Уязвимость CVE-2007-5730