Permissions, Privileges, and Access Controls in Xen - CVE-2013-0215
Published: March 7, 2013 / Updated: August 11, 2020
Xen
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.
oxenstored in Xen 4.1.x, Xen 4.2.x, and xen-unstable does not properly consider the state of the Xenstore ring during read operations, which allows guest OS users to cause a denial of service (daemon crash and host-control outage, or memory consumption) or obtain sensitive control-plane data by leveraging guest administrative access.
How to mitigate CVE-2013-0215
Sources
- http://openwall.com/lists/oss-security/2013/02/05/10
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=40f9c5e0a6d15b4ca1f6d4ed3a46f0871520eab5
- http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=61401264eb00fae4ee4efc8e9a5067449283207b