6.5 Medium
AI Score
Confidence
Low
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
0.4%
Joris van Rantwijk discovered that the Xen host did not correctly validate
the contents of a Xen guests’s grug.conf file. Xen guest root users could
exploit this to run arbitrary commands on the host when the guest system
was rebooted.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 7.04 | noarch | xen-utils-3.0 | < 3.0.3-0ubuntu10.1 | UNKNOWN |
Ubuntu | 7.04 | noarch | libxen3.0 | < 3.0.3-0ubuntu10.1 | UNKNOWN |
Ubuntu | 7.04 | noarch | libxen3.0-dev | < 3.0.3-0ubuntu10.1 | UNKNOWN |
Ubuntu | 7.04 | noarch | python-xen3.0 | < 3.0.3-0ubuntu10.1 | UNKNOWN |
Ubuntu | 7.04 | noarch | xen-hypervisor-3.0-amd64 | < 3.0.3-0ubuntu10.1 | UNKNOWN |
Ubuntu | 7.04 | noarch | xen-ioemu-3.0 | < 3.0.3-0ubuntu10.1 | UNKNOWN |