CVE-2011-1583

Current Description

Multiple integer overflows in tools/libxc/xc_dom_bzimageloader.c in Xen 3.2, 3.3, 4.0, and 4.1 allow local users to cause a denial of service and possibly execute arbitrary code via a crafted paravirtualised guest kernel image that triggers (1) a buffer overflow during a decompression loop or (2) an out-of-bounds read in the loader involving unspecified length fields.

Basic Data

PublishedAugust 12, 2011
Last ModifiedAugust 24, 2011
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-189
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score6.9
SeverityMEDIUM
Exploitability Score3.4
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationCitrixXen3.2.0*******
    2.3ApplicationCitrixXen3.3.0*******
    2.3ApplicationCitrixXen4.0.0*******
    2.3ApplicationCitrixXen4.1.0*******

Vulnerable Software List

VendorProductVersions
Citrix Xen 3.2.0, 3.3.0, 4.0.0, 4.1.0

References

NameSourceURLTags
[Xen-devel] 20110509 Xen security advisory CVE-2011-1583 - pv kernel image validationhttp://lists.xensource.com/archives/html/xen-devel/2011-05/msg00483.htmlMLISTPatch Vendor Advisory
[Xen-devel] 20110509 Re: Xen security advisory CVE-2011-1583 - pv kernel image validationhttp://lists.xensource.com/archives/html/xen-devel/2011-05/msg00491.htmlMLISTPatch
RHSA-2011:0496http://rhn.redhat.com/errata/RHSA-2011-0496.htmlREDHAT