Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-1321

Опубликовано: 30 окт. 2007
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled "NE2000 network driver and the socket code," but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730.

РелизСтатусПримечание
dapper

DNE

devel

DNE

edgy

DNE

feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

released

1:62+dfsg-0ubuntu3
intrepid

released

1:62+dfsg-0ubuntu3
jaunty

released

1:62+dfsg-0ubuntu3
karmic

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

released

0.9.0-2ubuntu2
hardy

not-affected

0.9.0-2ubuntu2
intrepid

not-affected

0.9.0-2ubuntu2
jaunty

not-affected

0.9.0-2ubuntu2
karmic

DNE

upstream

released

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

0.9.0-2ubuntu2
hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

not-affected

0.9.0-2ubuntu2
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

gutsy

released

3.1.0-0ubuntu18
hardy

not-affected

intrepid

not-affected

jaunty

DNE

karmic

DNE

upstream

released

Показывать по

Ссылки на источники

EPSS

Процентиль: 12%
0.00041
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
около 18 лет назад

Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled "NE2000 network driver and the socket code," but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730.

nvd
больше 17 лет назад

Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled "NE2000 network driver and the socket code," but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730.

debian
больше 17 лет назад

Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used ...

github
около 3 лет назад

Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled "NE2000 network driver and the socket code," but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730.

oracle-oval
больше 17 лет назад

ELSA-2007-0323: Important: xen security update (IMPORTANT)

EPSS

Процентиль: 12%
0.00041
Низкий

7.2 High

CVSS2

Уязвимость CVE-2007-1321