CVE-2007-3919 : Detail

CVE-2007-3919

A01-Broken Access Control
0.04%V4
Local
2007-10-28
15h00 +00:00
2017-09-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6 AV:L/AC:M/Au:S/C:N/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 4.0

    Debian>>Debian_linux >> Version 4.0

    Xensource_inc>>Xen >> Version 3.0.3_0_1

      Xensource_inc>>Xen >> Version 3.0.3_0_3

        References

        http://www.vupen.com/english/advisories/2007/3621
        Tags : vdb-entry, x_refsource_VUPEN
        http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
        Tags : vendor-advisory, x_refsource_MANDRIVA
        http://secunia.com/advisories/27408
        Tags : third-party-advisory, x_refsource_SECUNIA
        http://www.redhat.com/support/errata/RHSA-2008-0194.html
        Tags : vendor-advisory, x_refsource_REDHAT
        http://www.securitytracker.com/id?1018859
        Tags : vdb-entry, x_refsource_SECTRACK
        http://osvdb.org/41343
        Tags : vdb-entry, x_refsource_OSVDB
        http://secunia.com/advisories/27486
        Tags : third-party-advisory, x_refsource_SECUNIA
        http://secunia.com/advisories/29963
        Tags : third-party-advisory, x_refsource_SECUNIA
        http://www.securityfocus.com/bid/26190
        Tags : vdb-entry, x_refsource_BID
        http://secunia.com/advisories/27389
        Tags : third-party-advisory, x_refsource_SECUNIA
        http://secunia.com/advisories/27497
        Tags : third-party-advisory, x_refsource_SECUNIA
        http://www.debian.org/security/2007/dsa-1395
        Tags : vendor-advisory, x_refsource_DEBIAN
        http://osvdb.org/41342
        Tags : vdb-entry, x_refsource_OSVDB