The Xen package is vulnerable to Buffer Overflows. If the driver is in use, a malicious local administrator of a guest domain could potentially trigger this flaw and execute arbitrary code outside of the domain. Xen does not use this driver by default.
CPE | Name | Operator | Version |
---|---|---|---|
xen | eq | 3.0.3__25.0.3.el5 | |
xen | eq | 3.0.3__25.el5 |
osvdb.org/35495
secunia.com/advisories/25073
secunia.com/advisories/25095
secunia.com/advisories/27047
secunia.com/advisories/27072
secunia.com/advisories/27103
secunia.com/advisories/27486
secunia.com/advisories/29129
securitytracker.com/id?1018761
taviso.decsystem.org/virtsec.pdf
www.attrition.org/pipermail/vim/2007-October/001842.html
www.debian.org/security/2007/dsa-1284
www.mandriva.com/security/advisories?name=MDKSA-2007:203
www.mandriva.com/security/advisories?name=MDVSA-2008:162
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2007-0323.html
www.securityfocus.com/bid/23731
www.vupen.com/english/advisories/2007/1597
access.redhat.com/errata/RHSA-2007:0323
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9302
www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html
www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.html
www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html