First published: Tue Oct 30 2007(Updated: )
The NE2000 emulator in QEMU 0.8.2 allows local users to execute arbitrary code by writing Ethernet frames with a size larger than the MTU to the EN0_TCNT register, which triggers a heap-based buffer overflow in the slirp library, aka NE2000 "mtu" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the mtu overflow vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | =0.8.2 | |
Debian | =3.1 | |
Debian | =4.0 | |
SUSE Linux | =11.1 | |
SUSE Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5729 has a high severity due to its potential to allow local users to execute arbitrary code.
To fix CVE-2007-5729, you should update QEMU to a version where this vulnerability has been addressed.
CVE-2007-5729 specifically affects QEMU version 0.8.2.
CVE-2007-5729 is a heap-based buffer overflow vulnerability that occurs due to improper handling of Ethernet frames.
CVE-2007-5729 impacts multiple operating systems, including specific versions of Debian and openSUSE.