CVE-2007-1320
Summary
| CVE | CVE-2007-1320 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-05-02 17:19:00 UTC |
| Updated | 2020-12-15 23:52:00 UTC |
| Description | Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" heap overflow. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 3.1 | All | All | All |
| Operating System | Debian | Debian Linux | 4.0 | All | All | All |
| Operating System | Debian | Debian Linux | 3.1 | All | All | All |
| Operating System | Debian | Debian Linux | 4.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 8 | All | All | All |
| Operating System | Fedoraproject | Fedora | 9 | All | All | All |
| Operating System | Fedoraproject | Fedora | 8 | All | All | All |
| Operating System | Fedoraproject | Fedora | 9 | All | All | All |
| Operating System | Fedoraproject | Fedora Core | 6 | All | All | All |
| Operating System | Fedoraproject | Fedora Core | 6 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.0 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.1 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.0 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.1 | All | All | All |
| Application | Qemu | Qemu | 0.8.2 | All | All | All |
| Application | Qemu | Qemu | 0.8.2 | All | All | All |
| Operating System | Xen | Xen | - | All | All | All |
| Operating System | Xen | Xen | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fedora update for kvm - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| taviso.decsystem.org/virtsec.pdf | MISC | taviso.decsystem.org | Technical Description, Third Party Advisory |
| rhn.redhat.com | Red Hat Support | REDHAT | www.redhat.com | Third Party Advisory |
| [SECURITY] Fedora Core 6 Update: xen-3.0.3-12.fc6 | FEDORA | www.redhat.com | Third Party Advisory |
| SUSE Update for Multiple Packages - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | Third Party Advisory |
| 35494 | OSVDB | osvdb.org | Broken Link |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:002 | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| [SECURITY] Fedora 8 Update: kvm-60-6.fc8 | FEDORA | www.redhat.com | Third Party Advisory |
| Debian -- Security Information -- DSA-1384-1 xen-utils | DEBIAN | www.debian.org | Third Party Advisory |
| Debian update for qemu - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| KVM Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | Third Party Advisory |
| Support / Security / Advisories / / MDVSA-2008:162 | Mandriva | MANDRIVA | www.mandriva.com | Third Party Advisory |
| QEMU Various Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | Third Party Advisory |
| Red Hat update for xen - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Debian update for xen-utils - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Debian -- Security Information -- DSA-1284-1 qemu | DEBIAN | www.debian.org | Third Party Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Third Party Advisory |
| QEMU Multiple Local Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | Third Party Advisory |
| Mandriva update for xen - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| [SECURITY] Fedora 9 Update: kvm-65-7.fc9 | FEDORA | www.redhat.com | Third Party Advisory |
| Fedora update for xen - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Support / Security / Advisories / / MDKSA-2007:203 | Mandriva | MANDRIVA | www.mandriva.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.