Lucene search

K
cveRedhatCVE-2007-3105
HistoryJul 27, 2007 - 9:30 p.m.

CVE-2007-3105

2007-07-2721:30:00
CWE-119
redhat
web.nvd.nist.gov
51
2
cve-2007-3105
linux kernel
buffer overflow
rng
privilege escalation
denial of service
nvd

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

31.1%

Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving “bound check ordering”. NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root.

Affected configurations

Nvd
Node
linuxlinux_kernelRange2.6.22
VendorProductVersionCPE
linuxlinux_kernelcpe:/o:linux:linux_kernel::::

References

Social References

More

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

31.1%