Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-5730

Опубликовано: 30 окт. 2007
Источник: ubuntu
Приоритет: medium
CVSS2: 7.2

Описание

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.

РелизСтатусПримечание
dapper

DNE

devel

DNE

edgy

DNE

feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

released

1:62+dfsg-0ubuntu3
intrepid

released

1:62+dfsg-0ubuntu3
jaunty

released

1:62+dfsg-0ubuntu3
karmic

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

released

0.9.0-2
hardy

released

0.9.0-2
intrepid

released

0.9.0-2
jaunty

released

0.9.0-2
karmic

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

0.9.0-2
hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

released

0.9.0-2
upstream

needs-triage

Показывать по

Ссылки на источники

7.2 High

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.

nvd
больше 17 лет назад

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.

debian
больше 17 лет назад

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly ...

github
около 3 лет назад

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.

oracle-oval
около 17 лет назад

ELSA-2008-0194: xen security and bug fix update (IMPORTANT)

7.2 High

CVSS2