Lucene search

K
ubuntucveUbuntu.comUB:CVE-2007-3105
HistoryJul 27, 2007 - 12:00 a.m.

CVE-2007-3105

2007-07-2700:00:00
ubuntu.com
ubuntu.com
16

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

31.1%

Stack-based buffer overflow in the random number generator (RNG)
implementation in the Linux kernel before 2.6.22 might allow local root
users to cause a denial of service or gain privileges by setting the
default wakeup threshold to a value greater than the output pool size,
which triggers writing random numbers to the stack by the pool transfer
function involving “bound check ordering”. NOTE: this issue might only
cross privilege boundaries in environments that have granular assignment of
privileges for root.

OSVersionArchitecturePackageVersionFilename
ubuntu6.06noarchlinux-source-2.6.15< 2.6.15-29.58UNKNOWN
ubuntu6.10noarchlinux-source-2.6.17< 2.6.17.1-12.40UNKNOWN
ubuntu7.04noarchlinux-source-2.6.20< 2.6.20-16.31UNKNOWN

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

31.1%