Show filters
555 Total Results
Displaying 521-530 of 555
Sort by:
Attacker Value
Unknown
CVE-2009-1758
Disclosure Date: May 22, 2009 (last updated October 04, 2023)
The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."
0
Attacker Value
Unknown
CVE-2008-4993
Disclosure Date: November 07, 2008 (last updated October 04, 2023)
qemu-dm.debug in Xen 3.2.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/args temporary file.
0
Attacker Value
Unknown
CVE-2008-3687
Disclosure Date: August 14, 2008 (last updated October 04, 2023)
Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.
0
Attacker Value
Unknown
CVE-2008-1952
Disclosure Date: June 23, 2008 (last updated October 04, 2023)
The backend for XenSource Xen Para Virtualized Frame Buffer (PVFB) in Xen ioemu does not properly restrict the frame buffer size, which allows attackers to cause a denial of service (crash) by mapping an arbitrary amount of guest memory.
0
Attacker Value
Unknown
CVE-2008-1944
Disclosure Date: May 14, 2008 (last updated October 04, 2023)
Buffer overflow in the backend framebuffer of XenSource Xen Para-Virtualized Framebuffer (PVFB) Message 3.0 through 3.0.3 allows local users to cause a denial of service (SDL crash) and possibly execute arbitrary code via "bogus screen updates," related to missing validation of the "format of messages."
0
Attacker Value
Unknown
CVE-2008-1943
Disclosure Date: May 14, 2008 (last updated October 04, 2023)
Buffer overflow in the backend of XenSource Xen Para Virtualized Frame Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted description of a shared framebuffer.
0
Attacker Value
Unknown
CVE-2008-1619
Disclosure Date: April 02, 2008 (last updated October 04, 2023)
The ssm_i emulation in Xen 5.1 on IA64 architectures allows attackers to cause a denial of service (dom0 panic) via certain traffic, as demonstrated using an FTP stress test tool.
0
Attacker Value
Unknown
CVE-2007-6416
Disclosure Date: December 17, 2007 (last updated October 04, 2023)
The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and earlier, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.
0
Attacker Value
Unknown
CVE-2007-6207
Disclosure Date: December 04, 2007 (last updated October 04, 2023)
Xen 3.x, possibly before 3.1.2, when running on IA64 systems, does not check the RID value for mov_to_rr, which allows a VTi domain to read memory of other domains.
0
Attacker Value
Unknown
CVE-2007-5907
Disclosure Date: November 09, 2007 (last updated October 04, 2023)
Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).
0