CVE-2007-6416
Security: vulnerability of copy_to_user in PAL emulation
Severity Score
4.6
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and earlier, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.
La función copy_to_user en la funcionalidad del emulador PAL para Xen 3.1.2 y anteriores, cuando funciona sobre sistemas ia64, permite a un usuario invitado HVM acceder a la memoria física de su elección a través de un disparo de ciertas operaciones de mapeo.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-12-17 CVE Reserved
- 2007-12-17 CVE Published
- 2024-08-05 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://osvdb.org/41344 | Vdb Entry | |
http://secunia.com/advisories/28146 | Third Party Advisory | |
http://secunia.com/advisories/28643 | Third Party Advisory | |
http://www.securityfocus.com/bid/26954 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9840 | Signature |
URL | Date | SRC |
---|---|---|
http://xenbits.xensource.com/ext/ia64/xen-unstable.hg?rev/e6069a715fd7 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2008-0089.html | 2017-09-29 | |
https://access.redhat.com/security/cve/CVE-2007-6416 | 2008-01-23 | |
https://bugzilla.redhat.com/show_bug.cgi?id=425381 | 2008-01-23 |