6.8
CVSSv2

CVE-2015-3259

Published: 16/07/2015 Updated: 30/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 10 | Exploitability Score: 3.1
VMScore: 605
Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the xl command line utility in Xen 4.1.x up to and including 4.5.x allows local guest administrators to gain privileges via a long configuration argument.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.4.0

xen xen 4.1.4

xen xen 4.1.5

xen xen 4.3.1

xen xen 4.3.4

xen xen 4.5.0

xen xen 4.4.2

xen xen 4.1.6.1

xen xen 4.2.0

xen xen 4.1.1

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.2.3

xen xen 4.3.0

xen xen 4.4.1

xen xen 4.1.0

xen xen 4.2.1

xen xen 4.2.2

Vendor Advisories

Debian Bug report logs - #795721 CVE-2015-3259 CVE-2015-3340 CVE-2015-4163 CVE-2015-4164 Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 16 Aug 2015 12:45:02 UTC Severity: important Tags: security Fixed i ...
Multiple security issues have been found in the Xen virtualisation solution, which may result in denial of service or information disclosure For the oldstable distribution (wheezy), an update will be provided later For the stable distribution (jessie), these problems have been fixed in version 441-9+deb8u3 For the unstable distribution (sid), ...
Stack-based buffer overflow in the xl command line utility in Xen 41x through 45x allows local guest administrators to gain privileges via a long configuration argument ...