[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-7969Date: (C)2015-12-15   (M)2024-02-22


Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.9
Exploit Score: 3.9
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: COMPLETE
  
Reference:
SECTRACK-1034033
BID-77364
DSA-3414
FEDORA-2015-242be2c240
FEDORA-2015-6f6b79efe2
FEDORA-2015-a931b02be2
GLSA-201604-03
http://support.citrix.com/article/CTX202404
http://xenbits.xen.org/xsa/advisory-149.html
http://xenbits.xen.org/xsa/advisory-151.html
openSUSE-SU-2015:1965

CPE    23
cpe:/o:xen:xen:4.1.6.1
cpe:/o:xen:xen:4.0.1
cpe:/o:xen:xen:4.1.0
cpe:/o:xen:xen:4.0.0
...
CWE    1
CWE-399
OVAL    6
oval:org.secpod.oval:def:89045440
oval:org.secpod.oval:def:109893
oval:org.secpod.oval:def:109722
oval:org.secpod.oval:def:109702
...

© SecPod Technologies