{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2007-1217", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to cause a denial of service (crash) and possibly gain privileges via a crafted CAPI packet." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408530", "refsource" : "CONFIRM", "url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408530" }, { "name" : "http://bugzilla.kernel.org/show_bug.cgi?id=8028", "refsource" : "CONFIRM", "url" : "http://bugzilla.kernel.org/show_bug.cgi?id=8028" }, { "name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm", "refsource" : "CONFIRM", "url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm" }, { "name" : "GLSA-200704-23", "refsource" : "GENTOO", "url" : "http://security.gentoo.org/glsa/glsa-200704-23.xml" }, { "name" : "MDKSA-2007:078", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:078" }, { "name" : "RHSA-2007:0673", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0673.html" }, { "name" : "RHSA-2007:0672", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0672.html" }, { "name" : "RHSA-2007:0671", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0671.html" }, { "name" : "RHSA-2007:0774", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0774.html" }, { "name" : "RHSA-2007:0705", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0705.html" }, { "name" : "23333", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/23333" }, { "name" : "34742", "refsource" : "OSVDB", "url" : "http://osvdb.org/34742" }, { "name" : "oval:org.mitre.oval:def:10503", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10503" }, { "name" : "1018539", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id?1018539" }, { "name" : "24777", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24777" }, { "name" : "26379", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26379" }, { "name" : "26478", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26478" }, { "name" : "26709", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26709" }, { "name" : "26760", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26760" }, { "name" : "27528", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/27528" } ] } }