CVE-2007-4993

pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements.
References
Link Resource
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068
http://secunia.com/advisories/26986 Vendor Advisory
http://secunia.com/advisories/27047
http://secunia.com/advisories/27072
http://secunia.com/advisories/27085
http://secunia.com/advisories/27103
http://secunia.com/advisories/27141
http://secunia.com/advisories/27161
http://secunia.com/advisories/27486
http://www.debian.org/security/2007/dsa-1384
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
http://www.redhat.com/support/errata/RHSA-2007-0323.html
http://www.securityfocus.com/archive/1/481825/100/0/threaded
http://www.securityfocus.com/bid/25825
http://www.ubuntu.com/usn/usn-527-1
http://www.vupen.com/english/advisories/2007/3348
https://issues.rpath.com/browse/RPL-1752
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11240
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068
http://secunia.com/advisories/26986 Vendor Advisory
http://secunia.com/advisories/27047
http://secunia.com/advisories/27072
http://secunia.com/advisories/27085
http://secunia.com/advisories/27103
http://secunia.com/advisories/27141
http://secunia.com/advisories/27161
http://secunia.com/advisories/27486
http://www.debian.org/security/2007/dsa-1384
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
http://www.redhat.com/support/errata/RHSA-2007-0323.html
http://www.securityfocus.com/archive/1/481825/100/0/threaded
http://www.securityfocus.com/bid/25825
http://www.ubuntu.com/usn/usn-527-1
http://www.vupen.com/english/advisories/2007/3348
https://issues.rpath.com/browse/RPL-1752
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11240
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:xensource_inc:xen:3.0.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:36

Type Values Removed Values Added
References () http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068 - () http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068 -
References () http://secunia.com/advisories/26986 - Vendor Advisory () http://secunia.com/advisories/26986 - Vendor Advisory
References () http://secunia.com/advisories/27047 - () http://secunia.com/advisories/27047 -
References () http://secunia.com/advisories/27072 - () http://secunia.com/advisories/27072 -
References () http://secunia.com/advisories/27085 - () http://secunia.com/advisories/27085 -
References () http://secunia.com/advisories/27103 - () http://secunia.com/advisories/27103 -
References () http://secunia.com/advisories/27141 - () http://secunia.com/advisories/27141 -
References () http://secunia.com/advisories/27161 - () http://secunia.com/advisories/27161 -
References () http://secunia.com/advisories/27486 - () http://secunia.com/advisories/27486 -
References () http://www.debian.org/security/2007/dsa-1384 - () http://www.debian.org/security/2007/dsa-1384 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:203 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:203 -
References () http://www.redhat.com/support/errata/RHSA-2007-0323.html - () http://www.redhat.com/support/errata/RHSA-2007-0323.html -
References () http://www.securityfocus.com/archive/1/481825/100/0/threaded - () http://www.securityfocus.com/archive/1/481825/100/0/threaded -
References () http://www.securityfocus.com/bid/25825 - () http://www.securityfocus.com/bid/25825 -
References () http://www.ubuntu.com/usn/usn-527-1 - () http://www.ubuntu.com/usn/usn-527-1 -
References () http://www.vupen.com/english/advisories/2007/3348 - () http://www.vupen.com/english/advisories/2007/3348 -
References () https://issues.rpath.com/browse/RPL-1752 - () https://issues.rpath.com/browse/RPL-1752 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11240 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11240 -
References () https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html - () https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html -
References () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.html - () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.html -
References () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html - () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html -

Information

Published : 2007-09-27 17:17

Updated : 2024-11-21 00:36


NVD link : CVE-2007-4993

Mitre link : CVE-2007-4993

CVE.ORG link : CVE-2007-4993


JSON object : View

Products Affected

xensource_inc

  • xen
CWE
CWE-20

Improper Input Validation