CVE-2007-4573

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

7.2high2.0
0246810

CVSS Score: 7.2/10

All CVSS Scores

CVSS 2.0
7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Description

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-264

Related Vulnerabilities

BDU:2015-01615BDU:2015-01616BDU:2015-01617BDU:2015-01618BDU:2015-01619BDU:2015-01620BDU:2015-01621BDU:2015-01622BDU:2015-01623BDU:2015-01624BDU:2015-01625BDU:2015-01626BDU:2015-01627BDU:2015-01628BDU:2015-01629BDU:2015-01630BDU:2015-01631BDU:2015-01632BDU:2015-01633BDU:2015-01634BDU:2015-01635BDU:2015-01636BDU:2015-01637BDU:2015-01638BDU:2015-01639BDU:2015-01640BDU:2015-01641BDU:2015-01642BDU:2015-01643BDU:2015-01644BDU:2015-01645BDU:2015-01646BDU:2015-01647BDU:2015-01648BDU:2015-01649BDU:2015-01650BDU:2015-01651BDU:2015-01652BDU:2015-01653BDU:2015-01654BDU:2015-01655BDU:2015-01656BDU:2015-01657BDU:2015-01658BDU:2015-01659BDU:2015-01660BDU:2015-01661BDU:2015-01662BDU:2015-01663BDU:2015-01664BDU:2015-01665BDU:2015-01666BDU:2015-01667BDU:2015-01668BDU:2015-01669BDU:2015-01670BDU:2015-01671BDU:2015-01672BDU:2015-01673BDU:2015-01674BDU:2015-01675BDU:2015-01676BDU:2015-01677BDU:2015-01678BDU:2015-01679BDU:2015-01680BDU:2015-01681BDU:2015-01682BDU:2015-01683BDU:2015-01684BDU:2015-01685BDU:2015-01686BDU:2015-01687BDU:2015-01688BDU:2015-01689BDU:2015-01690BDU:2015-01691BDU:2015-01692BDU:2015-01693BDU:2015-01694BDU:2015-01695BDU:2015-01696BDU:2015-01697BDU:2015-01698BDU:2015-01699BDU:2015-01700BDU:2015-01701BDU:2015-01702BDU:2015-01703BDU:2015-01704BDU:2015-01705BDU:2015-01706BDU:2015-01707BDU:2015-01708BDU:2015-01709BDU:2015-01710BDU:2015-01711BDU:2015-01712BDU:2015-01713BDU:2015-01714BDU:2015-01715BDU:2015-01716BDU:2015-01717BDU:2015-01718BDU:2015-01719BDU:2015-01720BDU:2015-01721BDU:2015-01722BDU:2015-01723BDU:2015-01724BDU:2015-01725BDU:2015-01726BDU:2015-01727BDU:2015-01728BDU:2015-01729BDU:2015-01730BDU:2015-01731BDU:2015-01732BDU:2015-01733BDU:2015-01734BDU:2015-02148BDU:2015-04220BDU:2015-04221BDU:2015-04222BDU:2015-04223BDU:2015-04224BDU:2015-04225BDU:2015-04898BDU:2015-04899BDU:2015-04900BDU:2015-04901BDU:2015-04902BDU:2015-04903BDU:2015-04904BDU:2015-04905BDU:2015-04906BDU:2015-04907BDU:2015-04908BDU:2015-04909BDU:2015-04910BDU:2015-04911BDU:2015-04912BDU:2015-04913BDU:2015-04914BDU:2015-04915BDU:2015-04916BDU:2015-04917

Exploits

Exploit ID: 30604

Source: exploitdb

URL: https://www.exploit-db.com/exploits/30604

Exploit ID: 4460

Source: exploitdb

URL: https://www.exploit-db.com/exploits/4460

Vulnerable Software (3)

Type: Configuration

Product: linux

Operating System: ubuntu hardy 8.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux-2.6

Operating System: debian

Trait:
{  "fixed": "2.6.22-5"}

Source: debian

Type: Configuration

Vendor: linux

Product: linux_kernel

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:linux:linux_kernel:*:*:x86_64:*:*:*:*:*",      "versionEndIncluding": "2.4.35",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:...

Source: nvd