86 lines
2.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2007-3719",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-07-12T16:30:00.000",
"lastModified": "2008-11-15T06:53:51.077",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The process scheduler in the Linux kernel 2.6.16 gives preference to \"interactive\" processes that perform voluntary sleeps, which allows local users to cause a denial of service (CPU consumption), as described in \"Secretly Monopolizing the CPU Without Superuser Privileges.\""
},
{
"lang": "es",
"value": "El programador de procesos del n\u00facleo de Linux 2.6.16 da preferencia a procesos \"interactivos\" que llevan a cabo paradas (sleeps) voluntarias, lo cual permite a usuarios locales provocar una denegaci\u00f3n de servicio (consumo de CPU), como ha sido descrito en \"Monopolizando secretamente la CPU sin privilegios de Superusuario\"."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "The Red Hat Security Response Team has rated this issue as having moderate security impact.\n\nThe risks associated with fixing this bug are greater than the moderate severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG.",
"lastModified": "2009-10-26T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2"
}
]
}
]
}
],
"references": [
{
"url": "http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf",
"source": "cve@mitre.org"
}
]
}