7.1
CVSSv2

CVE-2007-4997

Published: 06/11/2007 Updated: 13/02/2023
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
VMScore: 633
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x prior to 2.6.23 allows remote malicious users to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an "off-by-two error."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: This is an update to DSA 1428-1 which omitted a reference to CVE-2007-5904 CVE-2007-3104 Eric Sandeen pro ...
The minix filesystem did not properly validate certain filesystem values If a local attacker could trick the system into attempting to mount a corrupted minix filesystem, the kernel could be made to hang for long periods of time, resulting in a denial of service This was only vulnerable in Ubuntu 704 and 710 (CVE-2006-6058) ...
The minix filesystem did not properly validate certain filesystem values If a local attacker could trick the system into attempting to mount a corrupted minix filesystem, the kernel could be made to hang for long periods of time, resulting in a denial of service (CVE-2006-6058) ...
The minix filesystem did not properly validate certain filesystem values If a local attacker could trick the system into attempting to mount a corrupted minix filesystem, the kernel could be made to hang for long periods of time, resulting in a denial of service (CVE-2006-6058) ...

References

CWE-189ftp://ftp.kernel.org/pub/linux/kernel/people/bunk/linux-2.6.16.y/testing/ChangeLog-2.6.16.57-rc1http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23http://www.mandriva.com/security/advisories?name=MDKSA-2007:226http://www.mandriva.com/security/advisories?name=MDKSA-2007:232http://www.redhat.com/support/errata/RHSA-2007-0993.htmlhttp://www.novell.com/linux/security/advisories/2007_59_kernel.htmlhttp://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.htmlhttp://secunia.com/advisories/27555http://secunia.com/advisories/27614http://secunia.com/advisories/27824http://secunia.com/advisories/27912http://www.debian.org/security/2007/dsa-1428http://www.redhat.com/support/errata/RHSA-2007-1104.htmlhttp://secunia.com/advisories/28033http://secunia.com/advisories/28162http://www.mandriva.com/security/advisories?name=MDVSA-2008:008http://www.ubuntu.com/usn/usn-574-1http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.htmlhttp://secunia.com/advisories/28706http://secunia.com/advisories/28806http://www.ubuntu.com/usn/usn-558-1http://www.securityfocus.com/bid/26337http://secunia.com/advisories/28170http://www.ubuntu.com/usn/usn-578-1http://secunia.com/advisories/28971http://www.mandriva.com/security/advisories?name=MDVSA-2008:105http://www.vupen.com/english/advisories/2007/3718https://exchange.xforce.ibmcloud.com/vulnerabilities/38247https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10596http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git%3Ba=commitdiff%3Bh=04045f98e0457aba7d4e6736f37eed189c48a5f7https://nvd.nist.govhttps://www.debian.org/security/./dsa-1428https://usn.ubuntu.com/574-1/