Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2007-1320
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-02 May, 2007 | 17:19
Updated At-15 Dec, 2020 | 23:52

Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" heap overflow.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

QEMU
qemu
>>qemu>>0.8.2
cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
Xen Project
xen
>>xen>>-
cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>8
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>9
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora_core>>6
cpe:2.3:o:fedoraproject:fedora_core:6:*:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>11.0
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>11.1
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>3.1
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>4.0
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.htmlcve@mitre.org
Mailing List
Third Party Advisory
http://osvdb.org/35494cve@mitre.org
Broken Link
http://secunia.com/advisories/25073cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/25095cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/27047cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/27085cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/27103cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/27486cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/29129cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/30413cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/33568cve@mitre.org
Third Party Advisory
http://taviso.decsystem.org/virtsec.pdfcve@mitre.org
Technical Description
Third Party Advisory
http://www.debian.org/security/2007/dsa-1284cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2007/dsa-1384cve@mitre.org
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203cve@mitre.org
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0323.htmlcve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/23731cve@mitre.org
Third Party Advisory
VDB Entry
http://www.vupen.com/english/advisories/2007/1597cve@mitre.org
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10315cve@mitre.org
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.htmlcve@mitre.org
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00706.htmlcve@mitre.org
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00935.htmlcve@mitre.org
Third Party Advisory
Change History
0Changes found

Details not found