CVE-2007-5730

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.
References
Link Resource
http://osvdb.org/42985 Broken Link
http://secunia.com/advisories/25073 Third Party Advisory Vendor Advisory
http://secunia.com/advisories/25095 Third Party Advisory
http://secunia.com/advisories/27486 Third Party Advisory
http://secunia.com/advisories/29129 Third Party Advisory
http://secunia.com/advisories/29963 Third Party Advisory
http://taviso.decsystem.org/virtsec.pdf Technical Description Third Party Advisory
http://www.attrition.org/pipermail/vim/2007-October/001842.html Third Party Advisory
http://www.debian.org/security/2007/dsa-1284 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0194.html Third Party Advisory
http://www.securityfocus.com/bid/23731 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/1597 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/38239 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000 Third Party Advisory
http://osvdb.org/42985 Broken Link
http://secunia.com/advisories/25073 Third Party Advisory Vendor Advisory
http://secunia.com/advisories/25095 Third Party Advisory
http://secunia.com/advisories/27486 Third Party Advisory
http://secunia.com/advisories/29129 Third Party Advisory
http://secunia.com/advisories/29963 Third Party Advisory
http://taviso.decsystem.org/virtsec.pdf Technical Description Third Party Advisory
http://www.attrition.org/pipermail/vim/2007-October/001842.html Third Party Advisory
http://www.debian.org/security/2007/dsa-1284 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0194.html Third Party Advisory
http://www.securityfocus.com/bid/23731 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/1597 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/38239 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:38

Type Values Removed Values Added
References () http://osvdb.org/42985 - Broken Link () http://osvdb.org/42985 - Broken Link
References () http://secunia.com/advisories/25073 - Third Party Advisory, Vendor Advisory () http://secunia.com/advisories/25073 - Third Party Advisory, Vendor Advisory
References () http://secunia.com/advisories/25095 - Third Party Advisory () http://secunia.com/advisories/25095 - Third Party Advisory
References () http://secunia.com/advisories/27486 - Third Party Advisory () http://secunia.com/advisories/27486 - Third Party Advisory
References () http://secunia.com/advisories/29129 - Third Party Advisory () http://secunia.com/advisories/29129 - Third Party Advisory
References () http://secunia.com/advisories/29963 - Third Party Advisory () http://secunia.com/advisories/29963 - Third Party Advisory
References () http://taviso.decsystem.org/virtsec.pdf - Technical Description, Third Party Advisory () http://taviso.decsystem.org/virtsec.pdf - Technical Description, Third Party Advisory
References () http://www.attrition.org/pipermail/vim/2007-October/001842.html - Third Party Advisory () http://www.attrition.org/pipermail/vim/2007-October/001842.html - Third Party Advisory
References () http://www.debian.org/security/2007/dsa-1284 - Third Party Advisory () http://www.debian.org/security/2007/dsa-1284 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:203 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDKSA-2007:203 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:162 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2008:162 - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2008-0194.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2008-0194.html - Third Party Advisory
References () http://www.securityfocus.com/bid/23731 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/23731 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2007/1597 - Third Party Advisory () http://www.vupen.com/english/advisories/2007/1597 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/38239 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/38239 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000 - Third Party Advisory

Information

Published : 2007-10-30 22:46

Updated : 2024-11-21 00:38


NVD link : CVE-2007-5730

Mitre link : CVE-2007-5730

CVE.ORG link : CVE-2007-5730


JSON object : View

Products Affected

qemu

  • qemu

debian

  • debian_linux

xen

  • xen
CWE
CWE-787

Out-of-bounds Write