Buffer overflow in Xen 4.4.x allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit guest kernel, related to searching for an appended DTB
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | CVE-2014-3715 | 19 May 201414:55 | โ | debiancve |
![]() | CVE-2014-3715 | 19 May 201400:00 | โ | ubuntucve |
![]() | CVE-2014-3715 | 19 May 201414:55 | โ | cve |
![]() | CVE-2014-3715 | 19 May 201414:55 | โ | nvd |
![]() | Buffer overflow | 19 May 201414:55 | โ | prion |
![]() | CVE-2014-3715 | 30 Oct 201510:34 | โ | redhatcve |
![]() | Xen buffer overflow | 15 May 201400:00 | โ | securityvulns |
![]() | input handling vulnerabilities loading guest kernel on ARM | 14 May 201410:44 | โ | xen |
Source | Link |
---|---|
openwall | www.openwall.com/lists/oss-security/2014/05/14/4 |
xenbits | www.xenbits.xen.org/xsa/advisory-95.html |
securitytracker | www.securitytracker.com/id/1030252 |
openwall | www.openwall.com/lists/oss-security/2014/05/16/1 |
openwall | www.openwall.com/lists/oss-security/2014/05/15/6 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo