Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2007-2875 First vendor Publication 2007-06-11
Vendor Cve Last vendor Modification 2018-10-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2875

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-189 Numeric Errors (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:9251
 
Oval ID: oval:org.mitre.oval:def:9251
Title: Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.
Description: Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.
Family: unix Class: vulnerability
Reference(s): CVE-2007-2875
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 3
Os 1
Os 876

OpenVAS Exploits

Date Description
2009-04-09 Name : Mandriva Update for kernel MDKSA-2007:171 (kernel)
File : nvt/gb_mandriva_MDKSA_2007_171.nasl
2009-03-23 Name : Ubuntu Update for linux-source-2.6.17 vulnerabilities USN-486-1
File : nvt/gb_ubuntu_USN_486_1.nasl
2009-03-23 Name : Ubuntu Update for linux-source-2.6.15 vulnerability USN-489-1
File : nvt/gb_ubuntu_USN_489_1.nasl
2009-03-23 Name : Ubuntu Update for redhat-cluster-suite vulnerability USN-489-2
File : nvt/gb_ubuntu_USN_489_2.nasl
2009-03-23 Name : Ubuntu Update for linux-source-2.6.20 vulnerabilities USN-510-1
File : nvt/gb_ubuntu_USN_510_1.nasl
2009-02-27 Name : Fedora Update for kernel FEDORA-2007-599
File : nvt/gb_fedora_2007_599_kernel_fc5.nasl
2009-02-27 Name : Fedora Update for kernel FEDORA-2007-600
File : nvt/gb_fedora_2007_600_kernel_fc6.nasl
2009-01-28 Name : SuSE Update for kernel SUSE-SA:2007:053
File : nvt/gb_suse_2007_053.nasl
2008-01-17 Name : Debian Security Advisory DSA 1363-1 (linux-2.6)
File : nvt/deb_1363_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
37113 Linux Kernel cpuset_tasks_read Function Local Underflow

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2007-0705.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2007-0705.nasl - Type : ACT_GATHER_INFO
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-486-1.nasl - Type : ACT_GATHER_INFO
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-489-1.nasl - Type : ACT_GATHER_INFO
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-489-2.nasl - Type : ACT_GATHER_INFO
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-510-1.nasl - Type : ACT_GATHER_INFO
2007-09-14 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2007-0705.nasl - Type : ACT_GATHER_INFO
2007-09-03 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1363.nasl - Type : ACT_GATHER_INFO
2007-09-03 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2007-171.nasl - Type : ACT_GATHER_INFO
2007-06-27 Name : The remote Fedora Core host is missing a security update.
File : fedora_2007-599.nasl - Type : ACT_GATHER_INFO
2007-06-27 Name : The remote Fedora Core host is missing a security update.
File : fedora_2007-600.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/24389
CONFIRM http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.13
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
DEBIAN http://www.debian.org/security/2007/dsa-1363
IDEFENSE http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=541
MANDRIVA http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
OSVDB http://osvdb.org/37113
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2007-0705.html
SECTRACK http://www.securitytracker.com/id?1018211
SECUNIA http://secunia.com/advisories/26133
http://secunia.com/advisories/26139
http://secunia.com/advisories/26620
http://secunia.com/advisories/26647
http://secunia.com/advisories/26760
http://secunia.com/advisories/27227
SUSE http://www.novell.com/linux/security/advisories/2007_53_kernel.html
UBUNTU http://www.ubuntu.com/usn/usn-486-1
http://www.ubuntu.com/usn/usn-489-1
http://www.ubuntu.com/usn/usn-510-1
VUPEN http://www.vupen.com/english/advisories/2007/2105
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/34779

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Date Informations
2024-02-02 01:06:37
  • Multiple Updates
2024-02-01 12:02:18
  • Multiple Updates
2023-09-05 12:06:11
  • Multiple Updates
2023-09-05 01:02:09
  • Multiple Updates
2023-09-02 12:06:17
  • Multiple Updates
2023-09-02 01:02:10
  • Multiple Updates
2023-08-12 12:07:18
  • Multiple Updates
2023-08-12 01:02:10
  • Multiple Updates
2023-08-11 12:06:20
  • Multiple Updates
2023-08-11 01:02:14
  • Multiple Updates
2023-08-06 12:06:01
  • Multiple Updates
2023-08-06 01:02:11
  • Multiple Updates
2023-08-04 12:06:07
  • Multiple Updates
2023-08-04 01:02:14
  • Multiple Updates
2023-07-14 12:06:06
  • Multiple Updates
2023-07-14 01:02:12
  • Multiple Updates
2023-03-29 01:06:51
  • Multiple Updates
2023-03-28 12:02:17
  • Multiple Updates
2022-10-11 12:05:25
  • Multiple Updates
2022-10-11 01:02:02
  • Multiple Updates
2022-03-11 01:04:41
  • Multiple Updates
2021-05-04 12:05:50
  • Multiple Updates
2021-04-22 01:06:23
  • Multiple Updates
2020-08-08 01:02:43
  • Multiple Updates
2020-07-30 01:02:51
  • Multiple Updates
2020-05-23 01:38:16
  • Multiple Updates
2020-05-23 00:19:50
  • Multiple Updates
2018-11-30 12:02:06
  • Multiple Updates
2018-10-30 12:02:13
  • Multiple Updates
2018-10-20 00:19:38
  • Multiple Updates
2017-10-11 09:23:58
  • Multiple Updates
2017-07-29 12:02:16
  • Multiple Updates
2016-07-21 12:01:58
  • Multiple Updates
2016-06-28 23:55:47
  • Multiple Updates
2016-06-28 16:32:43
  • Multiple Updates
2016-04-26 16:10:52
  • Multiple Updates
2014-02-17 10:40:19
  • Multiple Updates
2013-05-11 10:27:02
  • Multiple Updates
2012-11-07 00:15:22
  • Multiple Updates