[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2010-3699Date: (C)2010-12-08   (M)2024-02-22


The backend driver in Xen 3.x allows guest OS users to cause a denial of service via a kernel thread leak, which prevents the device and guest OS from being shut down or create a zombie domain, causes a hang in zenwatch, or prevents unspecified xm commands from working properly, related to (1) netback, (2) blkback, or (3) blktap.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.7
Exploit Score: 5.1
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: ADJACENT_NETWORK
Access Complexity: LOW
Authentication: SINGLE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
SECTRACK-1024786
http://www.securityfocus.com/archive/1/520102/100/0/threaded
SECUNIA-42372
SECUNIA-42789
SECUNIA-43056
BID-45039
SECUNIA-46397
ADV-2011-0024
ADV-2011-0213
RHSA-2011:0004
SUSE-SA:2011:005
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/59f097ef181b

CWE    1
CWE-399
OVAL    7
oval:org.secpod.oval:def:400020
oval:org.secpod.oval:def:600169
oval:org.secpod.oval:def:500255
oval:org.secpod.oval:def:400008
...

© SecPod Technologies