Vulnerability Description
The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux | 5.1.0 |
Related Weaknesses (CWE)
References
- http://osvdb.org/45909
- https://bugzilla.redhat.com/show_bug.cgi?id=232045
- http://osvdb.org/45909
- https://bugzilla.redhat.com/show_bug.cgi?id=232045
FAQ
What is CVE-2007-1865?
CVE-2007-1865 is a vulnerability with a CVSS score of 1.9 (LOW). The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the ...
How severe is CVE-2007-1865?
CVE-2007-1865 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1865?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux.