oxenstored in Xen 4.1.x, Xen 4.2.x, and xen-unstable does not properly consider the state of the Xenstore ring during read operations, which allows guest OS users to cause a denial of service (daemon crash and host-control outage, or memory consumption) or obtain sensitive control-plane data by leveraging guest administrative access.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2013/02/05/10 - | |
References | () http://secunia.com/advisories/55082 - | |
References | () http://security.gentoo.org/glsa/glsa-201309-24.xml - | |
References | () http://xenbits.xen.org/gitweb/?p=xen.git%3Ba=commit%3Bh=40f9c5e0a6d15b4ca1f6d4ed3a46f0871520eab5 - | |
References | () http://xenbits.xen.org/gitweb/?p=xen.git%3Ba=commit%3Bh=61401264eb00fae4ee4efc8e9a5067449283207b - |
Information
Published : 2013-03-07 05:04
Updated : 2024-11-21 01:47
NVD link : CVE-2013-0215
Mitre link : CVE-2013-0215
CVE.ORG link : CVE-2013-0215
JSON object : View
Products Affected
xen
- xen
CWE
CWE-264
Permissions, Privileges, and Access Controls