Vulnerabilidad en el sistema de archivos en libext2fs en e2fsprogs (CVE-2007-5497)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-189
Errores numéricos
Fecha de publicación:
07/12/2007
Última modificación:
09/04/2025
Descripción
Múltiples desbordamientos enteros en libext2fs en e2fsprogs versiones anteriores a 1.40.3, permiten a los atacantes remotos asistidos por el usuario ejecutar código arbitrario por medio de una imagen del sistema de archivos especialmente diseñada.
Impacto
Puntuación base 2.0
5.80
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:*:*:*:*:*:*:*:* | 1.40.2 (incluyendo) | |
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.02:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.03:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.04:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.05:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.06:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.07:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.08:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.09:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.15:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://lists.vmware.com/pipermail/security-announce/2008/000007.html
- http://secunia.com/advisories/27889
- http://secunia.com/advisories/27965
- http://secunia.com/advisories/27987
- http://secunia.com/advisories/28000
- http://secunia.com/advisories/28030
- http://secunia.com/advisories/28042
- http://secunia.com/advisories/28360
- http://secunia.com/advisories/28541
- http://secunia.com/advisories/28648
- http://secunia.com/advisories/29224
- http://secunia.com/advisories/32774
- http://secunia.com/advisories/40551
- http://sourceforge.net/project/shownotes.php?release_id=560230&group_id=2406
- http://support.avaya.com/elmodocs2/security/ASA-2008-040.htm
- http://support.citrix.com/article/CTX118766
- http://wiki.rpath.com/Advisories:rPSA-2007-0262
- http://www.debian.org/security/2007/dsa-1422
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A242
- http://www.novell.com/linux/security/advisories/2007_25_sr.html
- http://www.redhat.com/support/errata/RHSA-2008-0003.html
- http://www.securityfocus.com/archive/1/487999/100/0/threaded
- http://www.securityfocus.com/archive/1/489082/100/0/threaded
- http://www.securityfocus.com/bid/26772
- http://www.securitytracker.com/id?1019537=
- http://www.ubuntu.com/usn/usn-555-1
- http://www.vmware.com/security/advisories/VMSA-2008-0004.html
- http://www.vupen.com/english/advisories/2007/4135
- http://www.vupen.com/english/advisories/2008/0761
- http://www.vupen.com/english/advisories/2010/1796
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38903
- https://issues.rpath.com/browse/RPL-2011
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10399
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00618.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00629.html
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://lists.vmware.com/pipermail/security-announce/2008/000007.html
- http://secunia.com/advisories/27889
- http://secunia.com/advisories/27965
- http://secunia.com/advisories/27987
- http://secunia.com/advisories/28000
- http://secunia.com/advisories/28030
- http://secunia.com/advisories/28042
- http://secunia.com/advisories/28360
- http://secunia.com/advisories/28541
- http://secunia.com/advisories/28648
- http://secunia.com/advisories/29224
- http://secunia.com/advisories/32774
- http://secunia.com/advisories/40551
- http://sourceforge.net/project/shownotes.php?release_id=560230&group_id=2406
- http://support.avaya.com/elmodocs2/security/ASA-2008-040.htm
- http://support.citrix.com/article/CTX118766
- http://wiki.rpath.com/Advisories:rPSA-2007-0262
- http://www.debian.org/security/2007/dsa-1422
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A242
- http://www.novell.com/linux/security/advisories/2007_25_sr.html
- http://www.redhat.com/support/errata/RHSA-2008-0003.html
- http://www.securityfocus.com/archive/1/487999/100/0/threaded
- http://www.securityfocus.com/archive/1/489082/100/0/threaded
- http://www.securityfocus.com/bid/26772
- http://www.securitytracker.com/id?1019537=
- http://www.ubuntu.com/usn/usn-555-1
- http://www.vmware.com/security/advisories/VMSA-2008-0004.html
- http://www.vupen.com/english/advisories/2007/4135
- http://www.vupen.com/english/advisories/2008/0761
- http://www.vupen.com/english/advisories/2010/1796
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38903
- https://issues.rpath.com/browse/RPL-2011
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10399
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00618.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00629.html