CVE-2008-3687

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xen:xen:3.3:*:*:*:*:*:*:*
cpe:2.3:a:xen:xen_flask_module:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:49

Type Values Removed Values Added
References () http://invisiblethingslab.com/bh08/part2.pdf - () http://invisiblethingslab.com/bh08/part2.pdf -
References () http://secunia.com/advisories/31561 - () http://secunia.com/advisories/31561 -
References () http://theinvisiblethings.blogspot.com/2008/08/our-xen-0wning-trilogy-highlights.html - () http://theinvisiblethings.blogspot.com/2008/08/our-xen-0wning-trilogy-highlights.html -
References () http://www.nabble.com/-PATCH--XSM--FLASK--Argument-handling-bugs-in-XSM:FLASK-to18536032.html - Patch () http://www.nabble.com/-PATCH--XSM--FLASK--Argument-handling-bugs-in-XSM:FLASK-to18536032.html - Patch
References () http://www.securityfocus.com/bid/30834 - () http://www.securityfocus.com/bid/30834 -
References () http://www.securitytracker.com/id?1020731 - () http://www.securitytracker.com/id?1020731 -
References () http://www.vupen.com/english/advisories/2008/2426 - () http://www.vupen.com/english/advisories/2008/2426 -
References () http://xenbits.xensource.com/xen-3.3-testing.hg?rev/fa66b33f975a - () http://xenbits.xensource.com/xen-3.3-testing.hg?rev/fa66b33f975a -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44608 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44608 -

Information

Published : 2008-08-14 22:41

Updated : 2024-11-21 00:49


NVD link : CVE-2008-3687

Mitre link : CVE-2008-3687

CVE.ORG link : CVE-2008-3687


JSON object : View

Products Affected

xen

  • xen
  • xen_flask_module
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer