CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
45.5%
The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in “certain address ranges.”
Vendor | Product | Version | CPE |
---|---|---|---|
xen | xen | 3.0.4 | cpe:/a:xen:xen:3.0.4::: |
xen | xen | 3.1.4 | cpe:/a:xen:xen:3.1.4::: |
xen | xen | 3.3.0 | cpe:/a:xen:xen:3.3.0::: |
xen | xen | cpe:/a:xen:xen:::: | |
xen | xen | 3.2.2 | cpe:/a:xen:xen:3.2.2::: |
xen | xen | 3.2 | cpe:/a:xen:xen:3.2::: |
xen | xen | 3.2.1 | cpe:/a:xen:xen:3.2.1::: |
xen | xen | 3.0.2 | cpe:/a:xen:xen:3.0.2::: |
xen | xen | 2.0 | cpe:/a:xen:xen:2.0::: |
xen | xen | 3.2.0 | cpe:/a:xen:xen:3.2.0::: |
lists.xensource.com/archives/html/xen-devel/2009-05/msg00561.html
secunia.com/advisories/35093
secunia.com/advisories/35298
www.debian.org/security/2009/dsa-1809
www.openwall.com/lists/oss-security/2009/05/14/2
www.securityfocus.com/bid/34957
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10313