Lucene search

K
debianDebianDEBIAN:DSA-3262-1:B4CE0
HistoryMay 18, 2015 - 9:29 p.m.

[SECURITY] [DSA 3262-1] xen security update

2015-05-1821:29:25
lists.debian.org
22

7.7 High

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:S/C:C/I:C/A:C

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.0%


Debian Security Advisory DSA-3262-1 [email protected]
http://www.debian.org/security/ Moritz Muehlenhoff
May 18, 2015 http://www.debian.org/security/faq


Package : xen
CVE ID : CVE-2015-3456

Jason Geffner discovered a buffer overflow in the emulated floppy
disk drive, resulting in the potential execution of arbitrary code.
This only affects HVM guests.

For the oldstable distribution (wheezy), this problem has been fixed
in version 4.1.4-3+deb7u6.

The stable distribution (jessie) is already fixed through the qemu
update provided as DSA-3259-1.

We recommend that you upgrade your xen packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

7.7 High

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:S/C:C/I:C/A:C

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.0%