Vulnerability Description
Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | 0.8.2 |
| Xen | Xen | All versions |
| Debian | Debian Linux | 3.1 |
Related Weaknesses (CWE)
References
- http://osvdb.org/42985Broken Link
- http://secunia.com/advisories/25073Third Party AdvisoryVendor Advisory
- http://secunia.com/advisories/25095Third Party Advisory
- http://secunia.com/advisories/27486Third Party Advisory
- http://secunia.com/advisories/29129Third Party Advisory
- http://secunia.com/advisories/29963Third Party Advisory
- http://taviso.decsystem.org/virtsec.pdfTechnical DescriptionThird Party Advisory
- http://www.attrition.org/pipermail/vim/2007-October/001842.htmlThird Party Advisory
- http://www.debian.org/security/2007/dsa-1284Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:203Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:162Third Party Advisory
- http://www.redhat.com/support/errata/RHSA-2008-0194.htmlThird Party Advisory
- http://www.securityfocus.com/bid/23731Third Party AdvisoryVDB Entry
- http://www.vupen.com/english/advisories/2007/1597Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38239Third Party AdvisoryVDB Entry
FAQ
What is CVE-2007-5730?
CVE-2007-5730 is a vulnerability with a CVSS score of 7.2 (HIGH). Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net soc...
How severe is CVE-2007-5730?
CVE-2007-5730 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-5730?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Xen Xen, Debian Debian Linux.