Page 30 of 148 results (0.007 seconds)

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints. El Xen 3.1.1 permite a usuarios invitados virtuales provocar una denegación de servicio (caída del hypervisor) mediante el uso de un registro de depuración (DR7) para establecer ciertos puntos de ruptura. • http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html http://lists.xensource.com/archives/html/xen-devel/2007-10/msg01048.html http://secunia.com/advisories/28405 http://secunia.com/advisories/28412 http://secunia.com/advisories/28636 http://www.novell.com/linux/security/advisories/suse_security_summary_report.html http://www.securityfocus.com/bid/27219 •

CVSS: 6.0EPSS: 0%CPEs: 14EXPL: 0

(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm. El (1) xenbaked y el (2) xenmon.py en el Xen 3.1 y versiones anteriores permite a usuarios locales truncar ficheros de su elección a través de un ataque de enlaces simbólicos en el /tmp/xenq-shm. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447795 http://osvdb.org/41342 http://osvdb.org/41343 http://secunia.com/advisories/27389 http://secunia.com/advisories/27408 http://secunia.com/advisories/27486 http://secunia.com/advisories/27497 http://secunia.com/advisories/29963 http://www.debian.org/security/2007/dsa-1395 http://www.mandriva.com/security/advisories?name=MDKSA-2007:203 http://www.redhat.com/support/errata/RHSA-2008-0194.html http://www.securit • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-377: Insecure Temporary File •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 1

pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements. pygrub (tools/pygrub/src/GrubConf.py) en Xen 3.0.3, en el arranque de un dominio invitado, permite a usuarios locales con privilegios elevados en el dominio invitado ejecutar comandos de su elección en el dominio 0 mediante un fichero grub.conf manipulado artesanalmente cuyo contenido es utilizado en sentencias exec. • https://www.exploit-db.com/exploits/30620 http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068 http://secunia.com/advisories/26986 http://secunia.com/advisories/27047 http://secunia.com/advisories/27072 http://secunia.com/advisories/27085 http://secunia.com/advisories/27103 http://secunia.com/advisories/27141 http://secunia.com/advisories/27161 http://secunia.com/advisories/27486 http://www.debian.org/security/2007/dsa-1384 http://www.mandriva.com/security/advisor • CWE-20: Improper Input Validation •