All the vulnerabilites related to suse - suse_united_linux
cve-2007-5197
Vulnerability from cvelistv5
Published
2007-11-02 16:00
Modified
2024-08-07 15:24
Severity ?
Summary
Buffer overflow in the Mono.Math.BigInteger class in Mono 1.2.5.1 and earlier allows context-dependent attackers to execute arbitrary code via unspecified vectors related to Reduce in Montgomery-based Pow methods.
References
http://www.gentoo.org/security/en/glsa/glsa-200711-10.xmlvendor-advisory, x_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilities/38248vdb-entry, x_refsource_XF
http://secunia.com/advisories/27493third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/26279vdb-entry, x_refsource_BID
http://bugs.gentoo.org/attachment.cgi?id=134361&action=viewx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/3716vdb-entry, x_refsource_VUPEN
http://bugs.gentoo.org/show_bug.cgi?id=197067x_refsource_CONFIRM
http://secunia.com/advisories/27583third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1018892vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/27937third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27511third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27639third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00249.htmlvendor-advisory, x_refsource_FEDORA
http://www.ubuntu.com/usn/usn-553-1vendor-advisory, x_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=MDKSA-2007:218vendor-advisory, x_refsource_MANDRIVA
https://bugzilla.redhat.com/show_bug.cgi?id=367471x_refsource_CONFIRM
http://secunia.com/advisories/27439third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27612third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2007/dsa-1397vendor-advisory, x_refsource_DEBIAN
http://www.novell.com/linux/security/advisories/2007_23_sr.htmlvendor-advisory, x_refsource_SUSE
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:24:42.132Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200711-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-10.xml"
          },
          {
            "name": "mono-big-integer-bo(38248)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38248"
          },
          {
            "name": "27493",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27493"
          },
          {
            "name": "26279",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26279"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/attachment.cgi?id=134361\u0026action=view"
          },
          {
            "name": "ADV-2007-3716",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3716"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=197067"
          },
          {
            "name": "27583",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27583"
          },
          {
            "name": "1018892",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018892"
          },
          {
            "name": "27937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27937"
          },
          {
            "name": "27511",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27511"
          },
          {
            "name": "27639",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27639"
          },
          {
            "name": "FEDORA-2007-3130",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00249.html"
          },
          {
            "name": "USN-553-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-553-1"
          },
          {
            "name": "MDKSA-2007:218",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:218"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=367471"
          },
          {
            "name": "27439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27439"
          },
          {
            "name": "27612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27612"
          },
          {
            "name": "DSA-1397",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1397"
          },
          {
            "name": "SUSE-SR:2007:023",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-10-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the Mono.Math.BigInteger class in Mono 1.2.5.1 and earlier allows context-dependent attackers to execute arbitrary code via unspecified vectors related to Reduce in Montgomery-based Pow methods."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200711-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-10.xml"
        },
        {
          "name": "mono-big-integer-bo(38248)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38248"
        },
        {
          "name": "27493",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27493"
        },
        {
          "name": "26279",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26279"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/attachment.cgi?id=134361\u0026action=view"
        },
        {
          "name": "ADV-2007-3716",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3716"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=197067"
        },
        {
          "name": "27583",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27583"
        },
        {
          "name": "1018892",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018892"
        },
        {
          "name": "27937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27937"
        },
        {
          "name": "27511",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27511"
        },
        {
          "name": "27639",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27639"
        },
        {
          "name": "FEDORA-2007-3130",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00249.html"
        },
        {
          "name": "USN-553-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-553-1"
        },
        {
          "name": "MDKSA-2007:218",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:218"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=367471"
        },
        {
          "name": "27439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27439"
        },
        {
          "name": "27612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27612"
        },
        {
          "name": "DSA-1397",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1397"
        },
        {
          "name": "SUSE-SR:2007:023",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-5197",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the Mono.Math.BigInteger class in Mono 1.2.5.1 and earlier allows context-dependent attackers to execute arbitrary code via unspecified vectors related to Reduce in Montgomery-based Pow methods."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200711-10",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-10.xml"
            },
            {
              "name": "mono-big-integer-bo(38248)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38248"
            },
            {
              "name": "27493",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27493"
            },
            {
              "name": "26279",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26279"
            },
            {
              "name": "http://bugs.gentoo.org/attachment.cgi?id=134361\u0026action=view",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/attachment.cgi?id=134361\u0026action=view"
            },
            {
              "name": "ADV-2007-3716",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3716"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=197067",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=197067"
            },
            {
              "name": "27583",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27583"
            },
            {
              "name": "1018892",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018892"
            },
            {
              "name": "27937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27937"
            },
            {
              "name": "27511",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27511"
            },
            {
              "name": "27639",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27639"
            },
            {
              "name": "FEDORA-2007-3130",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00249.html"
            },
            {
              "name": "USN-553-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-553-1"
            },
            {
              "name": "MDKSA-2007:218",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:218"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=367471",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=367471"
            },
            {
              "name": "27439",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27439"
            },
            {
              "name": "27612",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27612"
            },
            {
              "name": "DSA-1397",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1397"
            },
            {
              "name": "SUSE-SR:2007:023",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5197",
    "datePublished": "2007-11-02T16:00:00",
    "dateReserved": "2007-10-04T00:00:00",
    "dateUpdated": "2024-08-07T15:24:42.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-0980
Vulnerability from cvelistv5
Published
2007-02-16 01:00
Modified
2024-08-07 12:43
Severity ?
Summary
Unspecified vulnerability in HP Serviceguard for Linux; packaged for SuSE SLES8 and United Linux 1.0 before SG A.11.15.07, SuSE SLES9 and SLES10 before SG A.11.16.10, and Red Hat Enterprise Linux (RHEL) before SG A.11.16.10; allows remote attackers to obtain unauthorized access via unspecified vectors.
References
http://www.securitytracker.com/id?1017655vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/22574vdb-entry, x_refsource_BID
http://secunia.com/advisories/24134third-party-advisory, x_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750vendor-advisory, x_refsource_HP
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750vendor-advisory, x_refsource_HP
http://www.vupen.com/english/advisories/2007/0619vdb-entry, x_refsource_VUPEN
http://osvdb.org/33201vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:43:21.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017655",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017655"
          },
          {
            "name": "22574",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22574"
          },
          {
            "name": "24134",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24134"
          },
          {
            "name": "HBSBGN02189",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750"
          },
          {
            "name": "SSRT071297",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750"
          },
          {
            "name": "ADV-2007-0619",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0619"
          },
          {
            "name": "33201",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/33201"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-02-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in HP Serviceguard for Linux; packaged for SuSE SLES8 and United Linux 1.0 before SG A.11.15.07, SuSE SLES9 and SLES10 before SG A.11.16.10, and Red Hat Enterprise Linux (RHEL) before SG A.11.16.10; allows remote attackers to obtain unauthorized access via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-03-31T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1017655",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017655"
        },
        {
          "name": "22574",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22574"
        },
        {
          "name": "24134",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24134"
        },
        {
          "name": "HBSBGN02189",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750"
        },
        {
          "name": "SSRT071297",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750"
        },
        {
          "name": "ADV-2007-0619",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0619"
        },
        {
          "name": "33201",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/33201"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0980",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in HP Serviceguard for Linux; packaged for SuSE SLES8 and United Linux 1.0 before SG A.11.15.07, SuSE SLES9 and SLES10 before SG A.11.16.10, and Red Hat Enterprise Linux (RHEL) before SG A.11.16.10; allows remote attackers to obtain unauthorized access via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017655",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017655"
            },
            {
              "name": "22574",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22574"
            },
            {
              "name": "24134",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24134"
            },
            {
              "name": "HBSBGN02189",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750"
            },
            {
              "name": "SSRT071297",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750"
            },
            {
              "name": "ADV-2007-0619",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0619"
            },
            {
              "name": "33201",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/33201"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0980",
    "datePublished": "2007-02-16T01:00:00",
    "dateReserved": "2007-02-15T00:00:00",
    "dateUpdated": "2024-08-07T12:43:21.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-2654
Vulnerability from cvelistv5
Published
2007-05-14 21:00
Modified
2024-08-07 13:49
Severity ?
Summary
xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems.
References
http://secunia.com/advisories/25761third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/23922vdb-entry, x_refsource_BID
http://osvdb.org/36716vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/26867third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-516-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/25425third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_10_sr.htmlvendor-advisory, x_refsource_SUSE
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894x_refsource_MISC
http://secunia.com/advisories/25220third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:134vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:49:56.255Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "25761",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25761"
          },
          {
            "name": "23922",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23922"
          },
          {
            "name": "36716",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36716"
          },
          {
            "name": "26867",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26867"
          },
          {
            "name": "USN-516-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-516-1"
          },
          {
            "name": "25425",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25425"
          },
          {
            "name": "SUSE-SR:2007:010",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894"
          },
          {
            "name": "25220",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25220"
          },
          {
            "name": "MDKSA-2007:134",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:134"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-06-01T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "25761",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25761"
        },
        {
          "name": "23922",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23922"
        },
        {
          "name": "36716",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36716"
        },
        {
          "name": "26867",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26867"
        },
        {
          "name": "USN-516-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-516-1"
        },
        {
          "name": "25425",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25425"
        },
        {
          "name": "SUSE-SR:2007:010",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894"
        },
        {
          "name": "25220",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25220"
        },
        {
          "name": "MDKSA-2007:134",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:134"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2654",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "25761",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25761"
            },
            {
              "name": "23922",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23922"
            },
            {
              "name": "36716",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36716"
            },
            {
              "name": "26867",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26867"
            },
            {
              "name": "USN-516-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-516-1"
            },
            {
              "name": "25425",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25425"
            },
            {
              "name": "SUSE-SR:2007:010",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894",
              "refsource": "MISC",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894"
            },
            {
              "name": "25220",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25220"
            },
            {
              "name": "MDKSA-2007:134",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:134"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2654",
    "datePublished": "2007-05-14T21:00:00",
    "dateReserved": "2007-05-14T00:00:00",
    "dateUpdated": "2024-08-07T13:49:56.255Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2007-02-16 01:28
Modified
2024-11-21 00:27
Severity ?
Summary
Unspecified vulnerability in HP Serviceguard for Linux; packaged for SuSE SLES8 and United Linux 1.0 before SG A.11.15.07, SuSE SLES9 and SLES10 before SG A.11.16.10, and Red Hat Enterprise Linux (RHEL) before SG A.11.16.10; allows remote attackers to obtain unauthorized access via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE49B5F4-3999-4F41-BC88-74B351EB54FE",
              "versionEndIncluding": "sg_a.11.16.9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:*:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "56ED1471-C03C-45CA-8B8A-F2D1EFB1C492",
              "versionEndIncluding": "8_sg_a.11.15.6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:*:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "DA2C54C5-08CD-407D-BD45-91D8964144D9",
              "versionEndIncluding": "9_sg_a.11.16.9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:*:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "0CC2D349-8F0E-44C4-92C7-CFA70FB1FF09",
              "versionEndIncluding": "10_sg_a.11.16.9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_united_linux:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CCDD3DC-FBF0-4DAE-AC68-6E5F774F8350",
              "versionEndIncluding": "1.0_sg_a.11.16.9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:serviceguard_for_linux:a.11.14.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "61568770-49F7-499A-AB77-51CCEEAE9D33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:serviceguard_for_linux:a.11.15.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC76C3E-EFAF-42E1-9F63-ECF2208CD7F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:serviceguard_for_linux:a.11.16.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C91E3B5-7930-41E4-A2F3-EA2ED0C782C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in HP Serviceguard for Linux; packaged for SuSE SLES8 and United Linux 1.0 before SG A.11.15.07, SuSE SLES9 and SLES10 before SG A.11.16.10, and Red Hat Enterprise Linux (RHEL) before SG A.11.16.10; allows remote attackers to obtain unauthorized access via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en HP Serviceguard para Linux; empaquetado para SuSE SLES8 y United Linux 1.0 versiones anteriores a SG A.11.15.07, SuSE SLES9 y SLES10 versiones anteriores a SG A.11.16.10, y Red Hat Enterprise Linux (RHEL) versiones anteriores a SG A.11.16.10; permite a atacantes remotos obtener acceso no autorizado mediante vectores no especificados."
    }
  ],
  "id": "CVE-2007-0980",
  "lastModified": "2024-11-21T00:27:12.733",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-02-16T01:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/33201"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24134"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/22574"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1017655"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00860750"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/33201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/22574"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1017655"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0619"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-14 21:19
Modified
2024-11-21 00:31
Severity ?
Summary
xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894Exploit
cve@mitre.orghttp://osvdb.org/36716
cve@mitre.orghttp://secunia.com/advisories/25220Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25425Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25761Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26867Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:134
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_10_sr.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/23922
cve@mitre.orghttp://www.ubuntu.com/usn/usn-516-1
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894Exploit
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/36716
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25220Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25425Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25761Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26867Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:134
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_10_sr.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23922
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-516-1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*",
              "matchCriteriaId": "C7EAAD04-D7C4-43DE-B488-1AAD014B503E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "D2E2EF3C-1379-4CBE-8FF5-DACD47834651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:8.0:*:retail_solution:*:*:*:*:*",
              "matchCriteriaId": "9E4D356D-E894-4957-AD61-DA1145CC51FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "F7446746-87B7-4BD3-AABF-1E0FAA8265AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*",
              "matchCriteriaId": "F239BA8A-6B41-4B08-8C7C-25D235812C50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*",
              "matchCriteriaId": "89BA858B-9466-4640-84AE-DC5BDC65D6B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*",
              "matchCriteriaId": "3EA56868-ACA1-4C65-9FFB-A68129D2428A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*",
              "matchCriteriaId": "1BA2E629-58C6-4BA0-A447-F8F570B35E74",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "D5F98B9A-880E-45F0-8C16-12B22970F0D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*",
              "matchCriteriaId": "3BEE15E9-9194-4E37-AB3B-66ECD5AC9E11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*",
              "matchCriteriaId": "C89BA3B6-370B-4911-A363-935A9C9EACF5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*",
              "matchCriteriaId": "4F1B4D15-0562-44D6-B80B-35A8F432BD41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*",
              "matchCriteriaId": "D84ABF78-0D85-4E15-907E-B5ACE86EB8C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "9C7018E7-F90C-435D-A07A-05A294EA2827",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10:*:enterprise_desktop:*:*:*:*:*",
              "matchCriteriaId": "DC55429E-B607-402D-A491-0EFE7D522F2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "C69ED2AB-9E0D-43B3-90F3-E2E10A5B1773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*",
              "matchCriteriaId": "16915004-1006-41D6-9E42-D1A5041E442D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.1:*:personal:*:*:*:*:*",
              "matchCriteriaId": "6A8AC384-D568-46AA-8B4C-4CCCE472BAA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.1:*:professional:*:*:*:*:*",
              "matchCriteriaId": "397B7AE2-248A-4D89-A562-CAA3AD66C862",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.2:*:professional:*:*:*:*:*",
              "matchCriteriaId": "20C0890B-643B-49C9-B066-8F7D0DF1D0A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.2:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "D9558BE1-6549-44B5-B0C8-1BB57A96C3B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_united_linux:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF777CD-BB4F-4F21-A58E-4A42BD7DDE6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:suse:suse_linux_openexchange_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "042AF078-032E-4058-9BB1-362A0AADDD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:suse:suse_linux_school_server:gold:*:i386:*:*:*:*:*",
              "matchCriteriaId": "AB7A069E-9BFA-4DA0-918D-A60CF477D7DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:suse:suse_linux_standard_server:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B5A54A-07E9-4F28-8D2E-76B41C8F7965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:suse:suse_open_enterprise_server:9:*:*:*:*:*:*:*",
              "matchCriteriaId": "154457C9-9D8C-4125-A3E4-14A87C36976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xfsdump:xfsdump:2.2.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2304E36-F58C-42DF-8493-78D423A50546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:opensuse:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A4AF36-9BE4-4083-A70A-E3CE1244A616",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems."
    },
    {
      "lang": "es",
      "value": "xfs_fsr en xfsdump crea un directorio temporal .fsr con permisos no seguros, que permite a usuarios locales leer o sobrescribir archivos arbitrarios en sistemas de archivos xfs."
    }
  ],
  "id": "CVE-2007-2654",
  "lastModified": "2024-11-21T00:31:19.847",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-14T21:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/36716"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25220"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25425"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25761"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26867"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:134"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23922"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-516-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/36716"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25220"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25425"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25761"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26867"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23922"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-516-1"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-11-02 16:46
Modified
2024-11-21 00:37
Severity ?
Summary
Buffer overflow in the Mono.Math.BigInteger class in Mono 1.2.5.1 and earlier allows context-dependent attackers to execute arbitrary code via unspecified vectors related to Reduce in Montgomery-based Pow methods.
References
cve@mitre.orghttp://bugs.gentoo.org/attachment.cgi?id=134361&action=view
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=197067
cve@mitre.orghttp://secunia.com/advisories/27439
cve@mitre.orghttp://secunia.com/advisories/27493
cve@mitre.orghttp://secunia.com/advisories/27511
cve@mitre.orghttp://secunia.com/advisories/27583
cve@mitre.orghttp://secunia.com/advisories/27612
cve@mitre.orghttp://secunia.com/advisories/27639
cve@mitre.orghttp://secunia.com/advisories/27937
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1397
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200711-10.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:218
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_23_sr.html
cve@mitre.orghttp://www.securityfocus.com/bid/26279
cve@mitre.orghttp://www.securitytracker.com/id?1018892
cve@mitre.orghttp://www.ubuntu.com/usn/usn-553-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3716
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=367471
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/38248
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-November/msg00249.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/attachment.cgi?id=134361&action=view
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=197067
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27439
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27493
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27511
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27583
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27612
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27639
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27937
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1397
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200711-10.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:218
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_23_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26279
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018892
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-553-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3716
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=367471
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/38248
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00249.html



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:suse:suse_linux_openexchange_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "042AF078-032E-4058-9BB1-362A0AADDD92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*",
              "matchCriteriaId": "F5114DA3-FBB9-47C4-857B-3212404DAD4E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*",
              "matchCriteriaId": "4D5F5A52-285E-4E7E-83B8-508079DBCEAE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*",
              "matchCriteriaId": "674BE2D9-009B-46C5-A071-CB10368B8D48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*",
              "matchCriteriaId": "703486E5-906B-4BDB-A046-28D4D73E3F03",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*",
              "matchCriteriaId": "ABB5AC0D-2358-4C8E-99B5-2CE0A678F549",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*",
              "matchCriteriaId": "38B37184-BA88-44F1-AC9E-8B60C2419111",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*",
              "matchCriteriaId": "0D8C9247-3E18-4DD9-AF5B-B2996C76443F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*",
              "matchCriteriaId": "0EEA2CDD-7FCD-461E-90FC-CDB3C3992A32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*",
              "matchCriteriaId": "D7B877A8-5318-402E-8AE1-753E7419060F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*",
              "matchCriteriaId": "A3938420-087D-4D92-A2F8-EAE54D9837EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:s390:*:*:*:*:*",
              "matchCriteriaId": "4567FE5A-5061-4741-AA6D-4AB365579F8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "10F42CF8-FB98-4AFC-96C5-FD7D442B0FA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "24818450-FDA1-429A-AC17-68F44F584217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "02EE2D72-B1E6-4380-80B0-E40A23DDD115",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "D2E2EF3C-1379-4CBE-8FF5-DACD47834651",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:8.0:*:retail_solution:*:*:*:*:*",
              "matchCriteriaId": "9E4D356D-E894-4957-AD61-DA1145CC51FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "F7446746-87B7-4BD3-AABF-1E0FAA8265AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10:*:enterprise_desktop:*:*:*:*:*",
              "matchCriteriaId": "DC55429E-B607-402D-A491-0EFE7D522F2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "C69ED2AB-9E0D-43B3-90F3-E2E10A5B1773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10:sp1:enterprise_desktop:*:*:*:*:*",
              "matchCriteriaId": "C4F119BA-1FCA-41DF-B834-62F14CA8816E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.0:*:personal:*:*:*:*:*",
              "matchCriteriaId": "2B3DC9CF-50E3-4E4D-9C42-715F81A588DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.0:*:ppc:*:*:*:*:*",
              "matchCriteriaId": "96F0EAC3-9AC5-4575-80BB-00485619AE51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*",
              "matchCriteriaId": "994ABCE2-3B9E-4E4E-83F7-CE2A79C70F64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.0:*:x86:*:*:*:*:*",
              "matchCriteriaId": "CF733F56-9793-4C72-AB61-3A4AA9C468C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.0:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "3FBC151E-D478-43FA-B5BD-1D8B25C703E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.1:*:personal:*:*:*:*:*",
              "matchCriteriaId": "6A8AC384-D568-46AA-8B4C-4CCCE472BAA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.1:*:ppc:*:*:*:*:*",
              "matchCriteriaId": "84B05DB5-3BF9-4576-970B-A1701FC369AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.1:*:professional:*:*:*:*:*",
              "matchCriteriaId": "397B7AE2-248A-4D89-A562-CAA3AD66C862",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.1:*:x86:*:*:*:*:*",
              "matchCriteriaId": "F15CDDE2-BA9E-4B8D-8B01-21494360290E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.1:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "5B367EE1-EB53-4DC6-B154-FFA99060DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.2:*:personal:*:*:*:*:*",
              "matchCriteriaId": "51054FD3-ECBE-41B5-BF33-1A4B5DF5FB36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:10.2:*:professional:*:*:*:*:*",
              "matchCriteriaId": "20C0890B-643B-49C9-B066-8F7D0DF1D0A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_united_linux:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF777CD-BB4F-4F21-A58E-4A42BD7DDE6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mono:mono:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE9A924D-4CB8-4081-9C9E-FC72DB869A7E",
              "versionEndIncluding": "1.2.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31A3175-7CC6-4367-9A3C-F3324156C818",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB77289-2AED-4BD4-9578-FEB0EC83701E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4299404-6C79-4B21-BB8C-115FA1E3AC28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "919CAD10-2F17-4F94-8116-815E77F5E998",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "19877D33-5DBF-40D7-87CB-545558C64771",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.1.13.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64E7267-E010-4FC8-879A-448C85BC250B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.1.13.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "683F75A5-E4E4-4416-8E1C-A2C694A30BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.1.13.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBE3CDD7-8553-4CB7-A0A7-B059B4D75B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE2C11F2-2A21-481E-8350-F3777A0A8033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.1.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC21FA7-648F-4E41-962B-664140FA4812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mono:mono:1.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9FF02E9-070C-4AAA-ABB7-26FC9E56C7A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the Mono.Math.BigInteger class in Mono 1.2.5.1 and earlier allows context-dependent attackers to execute arbitrary code via unspecified vectors related to Reduce in Montgomery-based Pow methods."
    },
    {
      "lang": "es",
      "value": "El desbordamiento de b\u00fafer en la clase Mono.Math.BigInteger en Mono versi\u00f3n 1.2.5.1 y anteriores permite que los atacantes dependiendo del contexto ejecutar c\u00f3digo arbitrario por medio de vectores no espec\u00edficos relacionados a  Reduce en m\u00e9todos Pow basados en Montgomery."
    }
  ],
  "id": "CVE-2007-5197",
  "lastModified": "2024-11-21T00:37:21.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-11-02T16:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/attachment.cgi?id=134361\u0026action=view"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=197067"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27439"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27493"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27511"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27583"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27612"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27639"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27937"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1397"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-10.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:218"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26279"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018892"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-553-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/3716"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=367471"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38248"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00249.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/attachment.cgi?id=134361\u0026action=view"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=197067"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27511"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27583"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27639"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1397"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-10.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26279"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018892"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-553-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3716"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=367471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38248"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00249.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}