#VU95212 Memory corruption in Linux kernel - CVE-2007-6151


| Updated: 2017-09-29

Vulnerability identifier: #VU95212

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2007-6151

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to memory corruption error within the isdn_ioctl() function in drivers/isdn/i4l/isdn_common.c. A local user can execute arbitrary code.

Mitigation
Install update from vendor's repository.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=eafe1aa37e6ec2d56f14732b5240c4dd09f0613a
https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
https://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
https://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
https://lists.vmware.com/pipermail/security-announce/2008/000023.html
https://rhn.redhat.com/errata/RHSA-2008-0055.html
https://secunia.com/advisories/28626
https://secunia.com/advisories/28706
https://secunia.com/advisories/28748
https://secunia.com/advisories/28889
https://secunia.com/advisories/28971
https://secunia.com/advisories/29058
https://secunia.com/advisories/29570
https://secunia.com/advisories/30110
https://secunia.com/advisories/30962
https://secunia.com/advisories/31246
https://secunia.com/advisories/33280
https://www.debian.org/security/2008/dsa-1479
https://www.debian.org/security/2008/dsa-1503
https://www.debian.org/security/2008/dsa-1504
https://www.mandriva.com/security/advisories?name=MDVSA-2008:086
https://www.mandriva.com/security/advisories?name=MDVSA-2008:112
https://www.redhat.com/support/errata/RHSA-2008-0211.html
https://www.redhat.com/support/errata/RHSA-2008-0787.html
https://www.securityfocus.com/bid/27497
https://www.ubuntu.com/usn/usn-574-1
https://www.ubuntu.com/usn/usn-578-1
https://www.vupen.com/english/advisories/2008/2222/references
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10971


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability