4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
xen is vulnerable to privilege escalation. A guest operating system could issue a block device request and read or write arbitrary memory locations, which could lead to privilege escalation.
CPE | Name | Operator | Version |
---|---|---|---|
xen | eq | 3.0.3__25.0.3.el5 | |
xen | eq | 3.0.3__25.el5 | |
xen | eq | 3.0.3__25.0.4.el5 |
lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
marc.info/?l=debian-security&m=120343592917055&w=2
secunia.com/advisories/29081
secunia.com/advisories/29129
secunia.com/advisories/29136
secunia.com/advisories/29172
secunia.com/advisories/29963
secunia.com/advisories/34642
secunia.com/advisories/35031
www.debian.org/security/2009/dsa-1799
www.mandriva.com/security/advisories?name=MDVSA-2008:162
www.mandriva.com/security/advisories?name=MDVSA-2009:016
www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2008-0194.html
www.securityfocus.com/bid/28001
access.redhat.com/errata/RHSA-2008:0194
bugzilla.redhat.com/show_bug.cgi?id=433560
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706
www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html