First published: Fri May 18 2007(Updated: )
The embedded Linux kernel in certain Sun-Brocade SilkWorm switches before 20070516 does not properly handle a situation in which a non-root user creates a kernel process, which allows attackers to cause a denial of service (oops and device reboot) via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Brocade SilkWorm | ||
Brocade SilkWorm | ||
Brocade SilkWorm | ||
Brocade SilkWorm | ||
Brocade SilkWorm 3850 Fabric Switch | ||
Brocade SilkWorm | ||
Brocade SilkWorm | ||
Brocade SilkWorm 4900 Fibre Channel Switch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2764 is rated as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2007-2764, you should update to the patched versions of the affected Sun-Brocade SilkWorm switches released after May 16, 2007.
Exploiting CVE-2007-2764 can lead to kernel process creation by non-root users, resulting in device reboots and service interruptions.
CVE-2007-2764 affects several Sun-Brocade SilkWorm switches prior to their May 2007 updates.
There are no known workarounds for CVE-2007-2764, so upgrading to a secure version is recommended.