[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-1920Date: (C)2013-06-20   (M)2023-12-22


Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.4
Exploit Score: 3.4
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECTRACK-1028388
SECUNIA-52857
SECUNIA-55082
BID-58880
OSVDB-92050
GLSA-201309-24
SUSE-SU-2014:0411
SUSE-SU-2014:0446
SUSE-SU-2014:0470
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00000.html
http://www.openwall.com/lists/oss-security/2013/04/04/7
openSUSE-SU-2013:0912
xen-cve20131920-code-exec(83226)

CPE    29
cpe:/o:xen:xen:4.1.0
cpe:/o:xen:xen:4.1.4
cpe:/o:xen:xen:4.1.3
cpe:/o:xen:xen:4.1.2
...
CWE    1
CWE-264
OVAL    25
oval:org.secpod.oval:def:104918
oval:org.secpod.oval:def:105897
oval:org.secpod.oval:def:105413
oval:org.secpod.oval:def:105138
...

© SecPod Technologies