Vulnerability Description
Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.23 |
Related Weaknesses (CWE)
References
- http://bugzilla.kernel.org/show_bug.cgi?id=9416
- http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2008-0055.html
- http://secunia.com/advisories/27842
- http://secunia.com/advisories/27912
- http://secunia.com/advisories/28141
- http://secunia.com/advisories/28706
- http://secunia.com/advisories/28748
- http://secunia.com/advisories/28806
- http://secunia.com/advisories/28971
- http://secunia.com/advisories/29058
- http://secunia.com/advisories/29236
- http://secunia.com/advisories/33201
- http://secunia.com/advisories/33280
FAQ
What is CVE-2007-6063?
CVE-2007-6063 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
How severe is CVE-2007-6063?
CVE-2007-6063 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6063?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.