Lucene search

K
cve[email protected]CVE-2007-2172
HistoryApr 22, 2007 - 7:19 p.m.

CVE-2007-2172

2007-04-2219:19:00
CWE-20
web.nvd.nist.gov
45
cve-2007-2172
linux kernel
out-of-bounds access
security vulnerability
nvd

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.1%

A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an “out of bound access” by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.

Affected configurations

NVD
Node
linuxlinux_kernelRange2.4.02.4.35
OR
linuxlinux_kernelRange2.6.02.6.20
OR
linuxlinux_kernelMatch2.6.21git1
OR
linuxlinux_kernelMatch2.6.21git2
OR
linuxlinux_kernelMatch2.6.21git3
OR
linuxlinux_kernelMatch2.6.21git4
OR
linuxlinux_kernelMatch2.6.21git5
OR
linuxlinux_kernelMatch2.6.21git6
OR
linuxlinux_kernelMatch2.6.21git7
OR
linuxlinux_kernelMatch2.6.21rc1
OR
linuxlinux_kernelMatch2.6.21rc2
OR
linuxlinux_kernelMatch2.6.21rc3
OR
linuxlinux_kernelMatch2.6.21rc4
OR
linuxlinux_kernelMatch2.6.21rc5
Node
debiandebian_linuxMatch3.1
OR
debiandebian_linuxMatch4.0
Node
canonicalubuntu_linuxMatch6.06lts
OR
canonicalubuntu_linuxMatch6.10
OR
canonicalubuntu_linuxMatch7.04

References

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.1%