4.6
CVSSv2

CVE-2014-1950

Published: 14/02/2014 Updated: 12/12/2014
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x up to and including 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.1.5

xen xen 4.1.6.1

xen xen 4.1.1

xen xen 4.1.2

xen xen 4.2.2

xen xen 4.2.3

xen xen 4.1.3

xen xen 4.1.4

xen xen 4.3.0

xen xen 4.3.1

xen xen 4.2.0

xen xen 4.2.1

Vendor Advisories

Multiple security issues have been discovered in the Xen virtualisation solution which may result in information leaks or denial of service For the stable distribution (wheezy), these problems have been fixed in version 414-3+deb7u2 For the unstable distribution (sid), these problems will be fixed soon We recommend that you upgrade your xen pa ...
Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 41x through 43x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified ...