6.8
CVSSv2

CVE-2007-5904

Published: 09/11/2007 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 10 | Exploitability Score: 3.2
VMScore: 605
Vector: AV:A/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and previous versions allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

It was discovered that the ALSA /proc interface did not write the correct number of bytes when reporting memory allocations A local attacker might be able to access sensitive kernel memory, leading to a loss of privacy (CVE-2007-4571) ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: This is an update to DSA 1428-1 which omitted a reference to CVE-2007-5904 CVE-2007-3104 Eric Sandeen pro ...

References

CWE-119http://marc.info/?l=linux-kernel&m=119455843205403&w=2http://marc.info/?l=linux-kernel&m=119457447724276&w=2http://www.novell.com/linux/security/advisories/2007_63_kernel.htmlhttp://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.htmlhttp://www.securityfocus.com/bid/26438http://secunia.com/advisories/27666http://secunia.com/advisories/27888http://secunia.com/advisories/27912http://www.debian.org/security/2007/dsa-1428http://www.redhat.com/support/errata/RHSA-2008-0089.htmlhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048http://secunia.com/advisories/28826http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.htmlhttp://secunia.com/advisories/28643http://secunia.com/advisories/29245http://www.redhat.com/support/errata/RHSA-2008-0167.htmlhttp://secunia.com/advisories/29387http://www.securitytracker.com/id?1019612http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.htmlhttp://secunia.com/advisories/29570http://secunia.com/advisories/30769http://www.ubuntu.com/usn/usn-618-1http://secunia.com/advisories/30818http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.htmlhttp://www.vupen.com/english/advisories/2007/3860https://exchange.xforce.ibmcloud.com/vulnerabilities/38450https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901http://www.securityfocus.com/archive/1/487808/100/0/threadedhttp://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git%3Ba=commitdiff%3Bh=133672efbc1085f9af990bdc145e1822ea93bcf3https://usn.ubuntu.com/618-1/https://nvd.nist.gov