Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Xen
Опубликовано:11 ноября 2011 г.
Источник:
SecurityVulns ID:12030
Тип:локальная
Уровень опасности:
5/10
Описание:Многочисленные DoS-условия, повышение привилегий через PCI passthrough.
Затронутые продукты:XEN : Xen 3.2
 XEN : xen 3.3
 XEN : Xen 4.0
 XEN : Xen 4.1
CVE:CVE-2011-3262 (tools/libxc/xc_dom_bzimageloader.c in Xen 3.2, 3.3, 4.0, and 4.1 allows local users to cause a denial of service (management software infinite loop and management domain resource consumption) via unspecified vectors related to "Lack of error checking in the decompression loop.")
 CVE-2011-1898 (Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers.")
 CVE-2011-1583 (Multiple integer overflows in tools/libxc/xc_dom_bzimageloader.c in Xen 3.2, 3.3, 4.0, and 4.1 allow local users to cause a denial of service and possibly execute arbitrary code via a crafted paravirtualised guest kernel image that triggers (1) a buffer overflow during a decompression loop or (2) an out-of-bounds read in the loader involving unspecified length fields.)
 CVE-2011-1166 (Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород