First published: Wed Mar 28 2007(Updated: )
Buffer overflow in eject.c in Jason W. Bacon mcweject 0.9 on FreeBSD, and possibly other versions, allows local users to execute arbitrary code via a long command line argument, possibly involving the device name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =6.2-stable | |
Jason W. Bacon mcweject | =0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1719 has a high severity rating due to its potential for local users to execute arbitrary code.
To fix CVE-2007-1719, you should update to the latest version of mcweject or apply relevant patches that address this buffer overflow vulnerability.
CVE-2007-1719 affects local users running mcweject version 0.9 on FreeBSD and possibly other systems.
The vulnerability in CVE-2007-1719 is a buffer overflow that allows execution of arbitrary code through an excessively long command line argument.
While CVE-2007-1719 was disclosed in 2007, it may still be a risk if affected software remains unpatched in legacy systems.