CVE-2007-0771
Published May 2, 2007
Last updated 7 years ago
Overview
- Description
- The utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a denial of service (system hang) related to "MT exec + utrace_attach spin failure mode," as demonstrated by ptrace-thrash.c.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 6.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1817C772-D367-4ABE-B835-466D31A6DC89" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C667B8E4-64EB-4A05-84FF-B2243DEF757D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9484B41A-DFB6-4481-80D8-440C711CEA53" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53D373AF-DE6B-428E-9F0F-F1D220900A4D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2975DF7-F916-456C-BF7C-2694559E5282" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "784EB96E-2FD3-4F77-8DB6-4D6C7A928946" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "338BB401-8831-4094-9186-2B3CFA5903D3" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E32E6BA-AFEF-44A8-B230-87DD043BB222" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F69E575B-BD1A-4E50-8D6F-131D5E08058E" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE524195-06F1-4504-9223-07596588CC70" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FEED00F-3B70-4E57-AD80-7903AECED14B" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40D71CBC-D365-4710-BAB5-8A1159F35E41" } ], "operator": "OR" } ] } ]