CVE-2007-1321
Summary
| CVE | CVE-2007-1321 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-10-30 22:46:00 UTC |
| Updated | 2020-12-15 23:52:00 UTC |
| Description | Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled "NE2000 network driver and the socket code," but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 3.1 | All | All | All |
| Operating System | Debian | Debian Linux | 4.0 | All | All | All |
| Operating System | Debian | Debian Linux | 3.1 | All | All | All |
| Operating System | Debian | Debian Linux | 4.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 7 | All | All | All |
| Operating System | Fedoraproject | Fedora | 7 | All | All | All |
| Operating System | Fedoraproject | Fedora Core | 6 | All | All | All |
| Operating System | Fedoraproject | Fedora Core | 6 | All | All | All |
| Application | Qemu | Qemu | 0.8.2 | All | All | All |
| Application | Qemu | Qemu | 0.8.2 | All | All | All |
| Operating System | Xen | Xen | - | All | All | All |
| Operating System | Xen | Xen | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| taviso.decsystem.org/virtsec.pdf | MISC | taviso.decsystem.org | Technical Description, Third Party Advisory |
| rhn.redhat.com | Red Hat Support | REDHAT | www.redhat.com | Third Party Advisory |
| [SECURITY] Fedora Core 6 Update: xen-3.0.3-12.fc6 | FEDORA | www.redhat.com | Third Party Advisory |
| Debian update for qemu - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Fedora update for xen - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| KVM Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | Third Party Advisory |
| Support / Security / Advisories / / MDVSA-2008:162 | Mandriva | MANDRIVA | www.mandriva.com | Third Party Advisory |
| QEMU Various Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | Third Party Advisory |
| Red Hat update for xen - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | Third Party Advisory |
| Debian -- Security Information -- DSA-1284-1 qemu | DEBIAN | www.debian.org | Third Party Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Third Party Advisory |
| QEMU Multiple Local Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| [SECURITY] Fedora 7 Update: xen-3.1.0-6.fc7 | FEDORA | www.redhat.com | Third Party Advisory |
| Xen NE2000 Driver Heap Overflow May Let Local Users Gain Elevated Privileges - SecurityTracker | SECTRACK | securitytracker.com | Third Party Advisory, VDB Entry |
| Mandriva update for xen - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Fedora update for xen - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Support / Security / Advisories / / MDKSA-2007:203 | Mandriva | MANDRIVA | www.mandriva.com | Third Party Advisory |
| [VIM] Clarification on old QEMU/NE2000/Xen issues | VIM | www.attrition.org | Third Party Advisory |
| 35495 | OSVDB | osvdb.org | Broken Link |
| [SECURITY] Fedora 7 Update: xen-3.1.0-8.fc7 | FEDORA | www.redhat.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.