Buffer overflow in Xen - CVE-2013-2072

 

Buffer overflow in Xen - CVE-2013-2072

Published: August 29, 2013 / Updated: July 28, 2020


Vulnerability identifier: #VU32676
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2013-2072
CWE-ID: CWE-119
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
Xen
Software vendor:
Xen Project

Description

The vulnerability allows a remote #AU# to execute arbitrary code.

Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap.


Remediation

Install update from vendor's website.

External links