CVE-2007-1320

N/A Unknown
Published: May 02, 2007 Modified: April 23, 2026
View on NVD

Description

Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" heap overflow.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://osvdb.org/35494
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/25073
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/25095
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/27047
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/27085
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/27103
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/27486
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/29129
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/30413
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/33568
Source: cve@mitre.org
Third Party Advisory
http://taviso.decsystem.org/virtsec.pdf
Source: cve@mitre.org
Technical Description Third Party Advisory
http://www.debian.org/security/2007/dsa-1284
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2007/dsa-1384
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0323.html
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/23731
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/1597
Source: cve@mitre.org
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://osvdb.org/35494
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25073
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/25095
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/27047
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/27085
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/27103
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/27486
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/29129
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/30413
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/33568
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://taviso.decsystem.org/virtsec.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Technical Description Third Party Advisory
http://www.debian.org/security/2007/dsa-1284
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2007/dsa-1384
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0323.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/23731
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/1597
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10315
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00706.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00935.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

46 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
17th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

qemu fedoraproject debian xen opensuse