// For flags

CVE-2007-0822

 

Severity Score

1.9
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

umount, when running with the Linux 2.6.15 kernel on Slackware Linux 10.2, allows local users to trigger a NULL dereference and application crash by invoking the program with a pathname for a USB pen drive that was mounted and then physically removed, which might allow the users to obtain sensitive information, including core file contents.

umount cuando se ejecuta con el kernel de Linux 2.6.15 en el Slackware Linux 10.2 permite a usuarios locales lanzar una referencia a NULL y una caída de la aplicación, mediante la invocación de un programa con el nombre de la ruta (pathname) para un dispositivo de almacenamiento USB que fue montado y luego quitado físicamente, lo que puede permitir a los usuarios obtener información sensible, incluyendo los contenidos de los ficheros esenciales.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-02-07 CVE Reserved
  • 2007-02-07 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.15
Search vendor "Linux" for product "Linux Kernel" and version "2.6.15"
-
Affected