CVE-2007-1320

Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" heap overflow.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html Mailing List Third Party Advisory
http://osvdb.org/35494 Broken Link
http://secunia.com/advisories/25073 Third Party Advisory
http://secunia.com/advisories/25095 Third Party Advisory
http://secunia.com/advisories/27047 Third Party Advisory
http://secunia.com/advisories/27085 Third Party Advisory
http://secunia.com/advisories/27103 Third Party Advisory
http://secunia.com/advisories/27486 Third Party Advisory
http://secunia.com/advisories/29129 Third Party Advisory
http://secunia.com/advisories/30413 Third Party Advisory
http://secunia.com/advisories/33568 Third Party Advisory
http://taviso.decsystem.org/virtsec.pdf Technical Description Third Party Advisory
http://www.debian.org/security/2007/dsa-1284 Third Party Advisory
http://www.debian.org/security/2007/dsa-1384 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0323.html Third Party Advisory
http://www.securityfocus.com/bid/23731 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/1597 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10315 Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00706.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00935.html Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora_core:6:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2007-05-02 17:19

Updated : 2023-12-10 10:40


NVD link : CVE-2007-1320

Mitre link : CVE-2007-1320

CVE.ORG link : CVE-2007-1320


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora
  • fedora_core

opensuse

  • opensuse

xen

  • xen

qemu

  • qemu
CWE
CWE-787

Out-of-bounds Write