CVE-2007-1320
xen/qemu Cirrus LGD-54XX "bitblt" Heap Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" heap overflow.
Múltiples desbordamientos de búfer en la región heap de la memoria en la función cirrus_invalidate_region en la extensión Cirrus VGA en QEMU versión 0.8.2, como es usado en Xen y posiblemente otros productos, podrían permitir a usuarios locales ejecutar código arbitrario por medio de vectores no especificados relacionados a "attempting to mark non-existent regions as dirty," también se conoce como el desbordamiento de la pila "bitblt".
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-03-07 CVE Reserved
- 2007-05-02 CVE Published
- 2024-06-27 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (25)
URL | Tag | Source |
---|---|---|
http://osvdb.org/35494 | Broken Link | |
http://secunia.com/advisories/25073 | Third Party Advisory | |
http://secunia.com/advisories/25095 | Third Party Advisory | |
http://secunia.com/advisories/27047 | Third Party Advisory | |
http://secunia.com/advisories/27085 | Third Party Advisory | |
http://secunia.com/advisories/27103 | Third Party Advisory | |
http://secunia.com/advisories/27486 | Third Party Advisory | |
http://secunia.com/advisories/29129 | Third Party Advisory | |
http://secunia.com/advisories/30413 | Third Party Advisory | |
http://secunia.com/advisories/33568 | Third Party Advisory | |
http://taviso.decsystem.org/virtsec.pdf | Technical Description | |
http://www.securityfocus.com/bid/23731 | Third Party Advisory | |
http://www.vupen.com/english/advisories/2007/1597 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10315 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | 0.8.2 Search vendor "Qemu" for product "Qemu" and version "0.8.2" | - |
Affected
| in | Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | - | - |
Safe
|
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 8 Search vendor "Fedoraproject" for product "Fedora" and version "8" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 9 Search vendor "Fedoraproject" for product "Fedora" and version "9" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Core Search vendor "Fedoraproject" for product "Fedora Core" | 6 Search vendor "Fedoraproject" for product "Fedora Core" and version "6" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.0 Search vendor "Opensuse" for product "Opensuse" and version "11.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.1 Search vendor "Opensuse" for product "Opensuse" and version "11.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 3.1 Search vendor "Debian" for product "Debian Linux" and version "3.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
|