Vulnerability CVE-2007-1321: Information

Description

Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled "NE2000 network driver and the socket code," but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730.

Severity: HIGH (7.2)

Published: Oct. 31, 2007
Modified: Dec. 16, 2020

References to Advisories, Solutions, and Tools

Hyperlink
Resource
http://taviso.decsystem.org/virtsec.pdf
  • Technical Description
  • Third Party Advisory
DSA-1284
  • Third Party Advisory
RHSA-2007:0323
  • Third Party Advisory
FEDORA-2007-2270
  • Third Party Advisory
FEDORA-2007-713
  • Third Party Advisory
MDKSA-2007:203
  • Third Party Advisory
20071030 Clarification on old QEMU/NE2000/Xen issues
  • Third Party Advisory
23731
  • Third Party Advisory
  • VDB Entry
1018761
  • Third Party Advisory
  • VDB Entry
27072
  • Third Party Advisory
27103
  • Third Party Advisory
27486
  • Third Party Advisory
25073
  • Third Party Advisory
25095
  • Third Party Advisory
27047
  • Third Party Advisory
FEDORA-2007-2708
  • Third Party Advisory
MDVSA-2008:162
  • Third Party Advisory
29129
  • Third Party Advisory
ADV-2007-1597
  • Third Party Advisory
35495
  • Broken Link
oval:org.mitre.oval:def:9302
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*

      Configuration 2

      cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*

      cpe:2.3:o:fedoraproject:fedora_core:6:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*