7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
xen is vulnerable to privilege escalation. The vulnerability exists as it was found to allow unprivileged DomU domains to overwrite xenstore values which should only be changeable by the privileged Dom0 domain. An attacker controlling a DomU domain could, potentially, use this flaw to kill arbitrary processes in Dom0 or trick a Dom0 user into accessing the text console of a different domain running on the same host. This update makes certain parts of the xenstore tree read-only to the unprivileged DomU domains.
lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
lists.xensource.com/archives/html/xen-devel/2008-09/msg00992.html
lists.xensource.com/archives/html/xen-devel/2008-09/msg00994.html
openwall.com/lists/oss-security/2008/09/30/6
secunia.com/advisories/32064
www.mandriva.com/security/advisories?name=MDVSA-2009:016
www.openwall.com/lists/oss-security/2008/10/04/3
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2009-0003.html
www.securityfocus.com/bid/31499
www.securitytracker.com/id?1020955
www.vupen.com/english/advisories/2008/2709
xenbits.xensource.com/staging/xen-3.3-testing.hg?rev/e0e17216ba70
access.redhat.com/errata/RHSA-2009:0003
bugzilla.redhat.com/show_bug.cgi?id=464817
bugzilla.redhat.com/show_bug.cgi?id=464818
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10627