Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2007-6151 |
CWE-ID | CWE-119 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU95212
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2007-6151
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to memory corruption error within the isdn_ioctl() function in drivers/isdn/i4l/isdn_common.c. A local user can execute arbitrary code.
MitigationInstall update from vendor's repository.
Vulnerable software versionsLinux kernel: All versions
CPE2.3 External linkshttps://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=eafe1aa37e6ec2d56f14732b5240c4dd09f0613a
https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
https://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
https://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
https://lists.vmware.com/pipermail/security-announce/2008/000023.html
https://rhn.redhat.com/errata/RHSA-2008-0055.html
https://secunia.com/advisories/28626
https://secunia.com/advisories/28706
https://secunia.com/advisories/28748
https://secunia.com/advisories/28889
https://secunia.com/advisories/28971
https://secunia.com/advisories/29058
https://secunia.com/advisories/29570
https://secunia.com/advisories/30110
https://secunia.com/advisories/30962
https://secunia.com/advisories/31246
https://secunia.com/advisories/33280
https://www.debian.org/security/2008/dsa-1479
https://www.debian.org/security/2008/dsa-1503
https://www.debian.org/security/2008/dsa-1504
https://www.mandriva.com/security/advisories?name=MDVSA-2008:086
https://www.mandriva.com/security/advisories?name=MDVSA-2008:112
https://www.redhat.com/support/errata/RHSA-2008-0211.html
https://www.redhat.com/support/errata/RHSA-2008-0787.html
https://www.securityfocus.com/bid/27497
https://www.ubuntu.com/usn/usn-574-1
https://www.ubuntu.com/usn/usn-578-1
https://www.vupen.com/english/advisories/2008/2222/references
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10971
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.