Lucene search

K
nvd[email protected]NVD:CVE-2007-3105
HistoryJul 27, 2007 - 9:30 p.m.

CVE-2007-3105

2007-07-2721:30:00
CWE-119
web.nvd.nist.gov
7

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

31.1%

Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving “bound check ordering”. NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root.

Affected configurations

Nvd
Node
linuxlinux_kernelRange2.6.22

References

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

31.1%