HIGH · 7.2

CVE-2007-5730

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net soc...

Vulnerability Description

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.

CVSS Score

7.2

HIGH

AV:L/AC:L/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
QemuQemu0.8.2
XenXenAll versions
DebianDebian Linux3.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2007-5730?

CVE-2007-5730 is a vulnerability with a CVSS score of 7.2 (HIGH). Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net soc...

How severe is CVE-2007-5730?

CVE-2007-5730 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2007-5730?

Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Xen Xen, Debian Debian Linux.