xend in Xen 3.0.3 does not properly limit the contents of the /local/domain xenstore directory tree, and does not properly restrict a guest VM's write access within this tree, which allows guest OS users to cause a denial of service and possibly have unspecified other impact by writing to (1) console/tty, (2) console/limit, or (3) image/device-model-pid. NOTE: this issue was originally reported as an issue in libvirt 0.3.3 and xenstore, but CVE is considering the core issue to be related to Xen.
References
Configurations
History
21 Nov 2024, 00:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html - | |
References | () http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00992.html - | |
References | () http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00994.html - | |
References | () http://openwall.com/lists/oss-security/2008/09/30/6 - | |
References | () http://secunia.com/advisories/32064 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:016 - | |
References | () http://www.openwall.com/lists/oss-security/2008/10/04/3 - | |
References | () http://www.redhat.com/support/errata/RHSA-2009-0003.html - | |
References | () http://www.securityfocus.com/bid/31499 - | |
References | () http://www.securitytracker.com/id?1020955 - | |
References | () http://www.vupen.com/english/advisories/2008/2709 - | |
References | () http://xenbits.xensource.com/staging/xen-3.3-testing.hg?rev/e0e17216ba70 - Exploit | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=464817 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=464818 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10627 - |
Information
Published : 2008-10-03 17:41
Updated : 2024-11-21 00:51
NVD link : CVE-2008-4405
Mitre link : CVE-2008-4405
CVE.ORG link : CVE-2008-4405
JSON object : View
Products Affected
citrix
- xen
CWE
CWE-264
Permissions, Privileges, and Access Controls