Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2014-3717
HistoryMay 19, 2014 - 2:55 p.m.

CVE-2014-3717

2014-05-1914:55:12
Debian Security Bug Tracker
security-tracker.debian.org
10

CVSS2

3.3

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:N/A:P

EPSS

0

Percentile

5.1%

Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.17.3+10-g091466ba55-1~deb12u1xen_4.17.3+10-g091466ba55-1~deb12u1_all.deb
Debian11allxen< 4.14.6-1xen_4.14.6-1_all.deb
Debian999allxen< 4.17.3+36-g54dacb5c02-1xen_4.17.3+36-g54dacb5c02-1_all.deb
Debian13allxen< 4.17.3+36-g54dacb5c02-1xen_4.17.3+36-g54dacb5c02-1_all.deb

CVSS2

3.3

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:N/A:P

EPSS

0

Percentile

5.1%