CVE-2007-0998
Published Mar 20, 2007
Last updated 7 years ago
Overview
- Description
- The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FE524195-06F1-4504-9223-07596588CC70" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_multiple_os:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AB55CA0F-06FB-4CED-BB2F-AB99C32062CF" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "40D71CBC-D365-4710-BAB5-8A1159F35E41" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:virtualization:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "37E17F28-76A9-4F73-8F58-35390BDCE6EE" }, { "criteria": "cpe:2.3:o:redhat:fedora_core:core_5.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DA3B94B6-A5E4-4432-802E-BFAD7F3B5B4C" }, { "criteria": "cpe:2.3:o:redhat:fedora_core:core6:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E007512B-2A01-4915-82D1-EDDEE8ED3190" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:xen:qemu:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AC03235-6F95-414A-8C93-5215E801676E" } ], "operator": "OR" } ], "operator": "AND" } ]