7.4
CVSSv2

CVE-2013-2072

Published: 28/08/2013 Updated: 31/12/2016
CVSS v2 Base Score: 7.4 | Impact Score: 10 | Exploitability Score: 4.4
VMScore: 660
Vector: AV:A/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.1.4

xen xen 4.1.5

xen xen 4.2.0

xen xen 4.2.1

xen xen 4.2.2

debian debian linux 7.0

xen xen 4.0.2

xen xen 4.0.3

xen xen 4.0.4

xen xen 4.0.0

xen xen 4.0.1

Vendor Advisories

Multiple security issues have been discovered in the Xen virtualisation solution which may result in denial of service, information disclosure or privilege escalation For the stable distribution (wheezy), these problems have been fixed in version 414-3+deb7u3 For the unstable distribution (sid), these problems will be fixed soon We recommend t ...
Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 40x, 41x, and 42x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap ...