Unrated severityNVD Advisory· Published Oct 30, 2007· Updated Apr 23, 2026
CVE-2007-5730
CVE-2007-5730
Description
Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.
Affected products
3cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
16- secunia.com/advisories/25073nvdThird Party AdvisoryVendor Advisory
- secunia.com/advisories/25095nvdThird Party Advisory
- secunia.com/advisories/27486nvdThird Party Advisory
- secunia.com/advisories/29129nvdThird Party Advisory
- secunia.com/advisories/29963nvdThird Party Advisory
- taviso.decsystem.org/virtsec.pdfnvdTechnical DescriptionThird Party Advisory
- www.attrition.org/pipermail/vim/2007-October/001842.htmlnvdThird Party Advisory
- www.debian.org/security/2007/dsa-1284nvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2008-0194.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/23731nvdThird Party AdvisoryVDB Entry
- www.vupen.com/english/advisories/2007/1597nvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/38239nvdThird Party AdvisoryVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000nvdThird Party Advisory
- osvdb.org/42985nvdBroken Link
News mentions
0No linked articles in our index yet.