2.1
CVSSv2

CVE-2007-4571

Published: 26/09/2007 Updated: 13/02/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel prior to 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

It was discovered that the ALSA /proc interface did not write the correct number of bytes when reporting memory allocations A local attacker might be able to access sensitive kernel memory, leading to a loss of privacy (CVE-2007-4571) ...
Several local vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2878 Bart Oldeman reported a denial of service (DoS) issue in the VFAT filesystem that allows local user ...

Exploits

/* source: wwwsecurityfocuscom/bid/25774/info /* The Linux kernel is prone to a local privilege-escalation vulnerability Exploiting this issue may allow local attackers to gain elevated privileges, facilitating the complete compromise of affected computers Versions of Linux kernel prior to 24353 and 26227 are vulnerable to th ...

References

NVD-CWE-Otherhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=600http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.8https://issues.rpath.com/browse/RPL-1761http://support.avaya.com/elmodocs2/security/ASA-2007-474.htmhttps://www.redhat.com/archives/fedora-package-announce/2007-September/msg00436.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-October/msg00083.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0939.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0993.htmlhttp://www.novell.com/linux/security/advisories/2007_53_kernel.htmlhttp://www.securityfocus.com/bid/25807http://www.securitytracker.com/id?1018734http://secunia.com/advisories/26918http://secunia.com/advisories/26989http://secunia.com/advisories/26980http://secunia.com/advisories/27101http://secunia.com/advisories/27436http://secunia.com/advisories/27227http://secunia.com/advisories/27747http://secunia.com/advisories/27824http://www.debian.org/security/2008/dsa-1479http://secunia.com/advisories/28626http://www.debian.org/security/2008/dsa-1505http://secunia.com/advisories/29054http://secunia.com/advisories/30769http://www.ubuntu.com/usn/usn-618-1http://www.vupen.com/english/advisories/2007/3272https://exchange.xforce.ibmcloud.com/vulnerabilities/36780https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9053http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccec6e2c4a74adf76ed4e2478091a311b1806212https://usn.ubuntu.com/618-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/30605/