2.1
CVSSv2

CVE-2007-4571

Published: 26/09/2007 Updated: 29/09/2017
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 216
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel prior to 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.

Affected Products

Vendor Product Versions
LinuxLinux Kernel2.6.22.7

Vendor Advisories

Several local vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2878 Bart Oldeman reported a denial of service (DoS) issue in the VFAT filesystem that allows local user ...
It was discovered that the ALSA /proc interface did not write the correct number of bytes when reporting memory allocations A local attacker might be able to access sensitive kernel memory, leading to a loss of privacy (CVE-2007-4571) ...

Exploits

/* source: wwwsecurityfocuscom/bid/25774/info /* The Linux kernel is prone to a local privilege-escalation vulnerability Exploiting this issue may allow local attackers to gain elevated privileges, facilitating the complete compromise of affected computers Versions of Linux kernel prior to 24353 and 26227 are vulnerable to th ...

References

NVD-CWE-Otherhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccec6e2c4a74adf76ed4e2478091a311b1806212http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.8http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=600http://secunia.com/advisories/26918http://secunia.com/advisories/26980http://secunia.com/advisories/26989http://secunia.com/advisories/27101http://secunia.com/advisories/27227http://secunia.com/advisories/27436http://secunia.com/advisories/27747http://secunia.com/advisories/27824http://secunia.com/advisories/28626http://secunia.com/advisories/29054http://secunia.com/advisories/30769http://support.avaya.com/elmodocs2/security/ASA-2007-474.htmhttp://www.debian.org/security/2008/dsa-1479http://www.debian.org/security/2008/dsa-1505http://www.novell.com/linux/security/advisories/2007_53_kernel.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0939.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0993.htmlhttp://www.securityfocus.com/bid/25807http://www.securitytracker.com/id?1018734http://www.ubuntu.com/usn/usn-618-1http://www.vupen.com/english/advisories/2007/3272https://exchange.xforce.ibmcloud.com/vulnerabilities/36780https://issues.rpath.com/browse/RPL-1761https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9053https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00083.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-September/msg00436.htmlhttps://www.rapid7.com/db/vulnerabilities/suse-cve-2007-4571https://nvd.nist.govhttps://www.exploit-db.com/exploits/30605/https://usn.ubuntu.com/618-1/https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2007-0993https://www.debian.org/security/./dsa-1479