Vulnerability Description
ScramDisk 4 Linux before 1.0-1 does not perform permission checks on mount points, which allows local users to gain privileges by using a system directory as a mount point for a container.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Scramdisk 4 Linux | Scramdisk 4 Linux | <= 1.0.0 |
References
- http://osvdb.org/34966
- http://secunia.com/advisories/24903Vendor Advisory
- http://sourceforge.net/tracker/index.php?func=detail&aid=1696780&group_id=101952Patch
- http://www.securityfocus.com/bid/23495
- http://www.vupen.com/english/advisories/2007/1418
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33677
- http://osvdb.org/34966
- http://secunia.com/advisories/24903Vendor Advisory
- http://sourceforge.net/tracker/index.php?func=detail&aid=1696780&group_id=101952Patch
- http://www.securityfocus.com/bid/23495
- http://www.vupen.com/english/advisories/2007/1418
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33677
FAQ
What is CVE-2007-2075?
CVE-2007-2075 is a vulnerability with a CVSS score of 6.9 (MEDIUM). ScramDisk 4 Linux before 1.0-1 does not perform permission checks on mount points, which allows local users to gain privileges by using a system directory as a mount point for a container.
How severe is CVE-2007-2075?
CVE-2007-2075 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2075?
Check the references section above for vendor advisories and patch information. Affected products include: Scramdisk 4 Linux Scramdisk 4 Linux.