7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
xen is vulnerable to arbitrary code execution. The hypervisor’s para-virtualized framebuffer (PVFB) backend failed to validate the format of messages serving to update the contents of the framebuffer. This could allow a malicious user to cause a denial of service, or compromise the privileged domain (Dom0).
CPE | Name | Operator | Version |
---|---|---|---|
xen | eq | 3.0.3__25.0.3.el5 | |
xen | eq | 3.0.3__25.el5 | |
xen | eq | 3.0.3__25.0.4.el5 | |
xen | eq | 3.0.3__25.0.3.el5 | |
xen | eq | 3.0.3__25.el5 | |
xen | eq | 3.0.3__25.0.4.el5 |
secunia.com/advisories/29963
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2008-0194.html
www.securityfocus.com/bid/29186
www.securitytracker.com/id?1020009
access.redhat.com/errata/RHSA-2008:0194
bugzilla.redhat.com/show_bug.cgi?id=443390
exchange.xforce.ibmcloud.com/vulnerabilities/42388
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10868