Lucene search

K
ubuntuUbuntuUSN-527-1
HistoryOct 05, 2007 - 12:00 a.m.

xen-3.0 vulnerability

2007-10-0500:00:00
ubuntu.com
37

6.5 Medium

AI Score

Confidence

Low

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

0.4%

Releases

  • Ubuntu 7.04

Packages

  • xen-3.0 -

Details

Joris van Rantwijk discovered that the Xen host did not correctly validate
the contents of a Xen guests’s grug.conf file. Xen guest root users could
exploit this to run arbitrary commands on the host when the guest system
was rebooted.

OSVersionArchitecturePackageVersionFilename
Ubuntu7.04noarchxen-utils-3.0< 3.0.3-0ubuntu10.1UNKNOWN
Ubuntu7.04noarchlibxen3.0< 3.0.3-0ubuntu10.1UNKNOWN
Ubuntu7.04noarchlibxen3.0-dev< 3.0.3-0ubuntu10.1UNKNOWN
Ubuntu7.04noarchpython-xen3.0< 3.0.3-0ubuntu10.1UNKNOWN
Ubuntu7.04noarchxen-hypervisor-3.0-amd64< 3.0.3-0ubuntu10.1UNKNOWN
Ubuntu7.04noarchxen-ioemu-3.0< 3.0.3-0ubuntu10.1UNKNOWN

6.5 Medium

AI Score

Confidence

Low

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

0.4%