CVE-2007-3919
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
28/10/2007
Last modified:
09/04/2025
Description
(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.
Impact
Base Score 2.0
6.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:s390:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:* | ||
| cpe:2.3:a:xensource_inc:xen:3.0.3_0_1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xensource_inc:xen:3.0.3_0_3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447795
- http://osvdb.org/41342
- http://osvdb.org/41343
- http://secunia.com/advisories/27389
- http://secunia.com/advisories/27408
- http://secunia.com/advisories/27486
- http://secunia.com/advisories/27497
- http://secunia.com/advisories/29963
- http://www.debian.org/security/2007/dsa-1395
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A203
- http://www.redhat.com/support/errata/RHSA-2008-0194.html
- http://www.securityfocus.com/bid/26190
- http://www.securitytracker.com/id?1018859=
- http://www.vupen.com/english/advisories/2007/3621
- https://exchange.xforce.ibmcloud.com/vulnerabilities/37403
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9913
- https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html
- https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00075.html
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447795
- http://osvdb.org/41342
- http://osvdb.org/41343
- http://secunia.com/advisories/27389
- http://secunia.com/advisories/27408
- http://secunia.com/advisories/27486
- http://secunia.com/advisories/27497
- http://secunia.com/advisories/29963
- http://www.debian.org/security/2007/dsa-1395
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A203
- http://www.redhat.com/support/errata/RHSA-2008-0194.html
- http://www.securityfocus.com/bid/26190
- http://www.securitytracker.com/id?1018859=
- http://www.vupen.com/english/advisories/2007/3621
- https://exchange.xforce.ibmcloud.com/vulnerabilities/37403
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9913
- https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html
- https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00075.html



