dtc-xen 0.5.x before 0.5.4 suffers from a race condition where an attacker could potentially get a bash access as xenXX user on the dom0, and then access a potentially reuse an already opened VPS console.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/dtc-xen/+bug/505072 | Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2009-4011 | Third Party Advisory |
https://tracker.debian.org/media/packages/d/dtc-xen/changelog-0.5.17-1.1 | Product Release Notes |
https://bugs.launchpad.net/ubuntu/+source/dtc-xen/+bug/505072 | Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2009-4011 | Third Party Advisory |
https://tracker.debian.org/media/packages/d/dtc-xen/changelog-0.5.17-1.1 | Product Release Notes |
Configurations
History
21 Nov 2024, 01:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.launchpad.net/ubuntu/+source/dtc-xen/+bug/505072 - Third Party Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2009-4011 - Third Party Advisory | |
References | () https://tracker.debian.org/media/packages/d/dtc-xen/changelog-0.5.17-1.1 - Product, Release Notes |
Information
Published : 2019-11-09 03:15
Updated : 2024-11-21 01:08
NVD link : CVE-2009-4011
Mitre link : CVE-2009-4011
CVE.ORG link : CVE-2009-4011
JSON object : View
Products Affected
dtc-xen_project
- dtc-xen
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')