[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110139

 
 

909

 
 

85964

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2007-1321Date: (C)2007-10-30   (M)2018-06-02


Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled "NE2000 network driver and the socket code," but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 6.6
Exploit Score: Exploit Score: 2.7
Impact Score: Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: LOCAL
Attack Complexity: Access Complexity: MEDIUM
Privileges Required: Authentication: SINGLE_INSTANCE
User Interaction: Confidentiality: COMPLETE
Scope: Integrity: COMPLETE
Confidentiality: Availability: COMPLETE
Integrity:  
Availability:  
  
Reference:
SECTRACK-1018761
http://www.attrition.org/pipermail/vim/2007-October/001842.html
BID-23731
SECUNIA-25073
SECUNIA-25095
SECUNIA-27047
SECUNIA-27072
SECUNIA-27103
SECUNIA-27486
SECUNIA-29129
OSVDB-35495
ADV-2007-1597
DSA-1284
FEDORA-2007-2270
FEDORA-2007-2708
FEDORA-2007-713
MDKSA-2007:203
MDVSA-2008:162
RHSA-2007:0323
http://taviso.decsystem.org/virtsec.pdf

CWE    1
CWE-189
OVAL    1
oval:org.secpod.oval:def:301614

© SecPod Technologies