Show filters
555 Total Results
Displaying 521-530 of 555
Sort by:
Attacker Value
Unknown

CVE-2009-1758

Disclosure Date: May 22, 2009 (last updated October 04, 2023)
The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."
0
Attacker Value
Unknown

CVE-2008-4993

Disclosure Date: November 07, 2008 (last updated October 04, 2023)
qemu-dm.debug in Xen 3.2.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/args temporary file.
0
Attacker Value
Unknown

CVE-2008-3687

Disclosure Date: August 14, 2008 (last updated October 04, 2023)
Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.
0
Attacker Value
Unknown

CVE-2008-1952

Disclosure Date: June 23, 2008 (last updated October 04, 2023)
The backend for XenSource Xen Para Virtualized Frame Buffer (PVFB) in Xen ioemu does not properly restrict the frame buffer size, which allows attackers to cause a denial of service (crash) by mapping an arbitrary amount of guest memory.
0
Attacker Value
Unknown

CVE-2008-1944

Disclosure Date: May 14, 2008 (last updated October 04, 2023)
Buffer overflow in the backend framebuffer of XenSource Xen Para-Virtualized Framebuffer (PVFB) Message 3.0 through 3.0.3 allows local users to cause a denial of service (SDL crash) and possibly execute arbitrary code via "bogus screen updates," related to missing validation of the "format of messages."
0
Attacker Value
Unknown

CVE-2008-1943

Disclosure Date: May 14, 2008 (last updated October 04, 2023)
Buffer overflow in the backend of XenSource Xen Para Virtualized Frame Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted description of a shared framebuffer.
0
Attacker Value
Unknown

CVE-2008-1619

Disclosure Date: April 02, 2008 (last updated October 04, 2023)
The ssm_i emulation in Xen 5.1 on IA64 architectures allows attackers to cause a denial of service (dom0 panic) via certain traffic, as demonstrated using an FTP stress test tool.
0
Attacker Value
Unknown

CVE-2007-6416

Disclosure Date: December 17, 2007 (last updated October 04, 2023)
The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and earlier, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.
0
Attacker Value
Unknown

CVE-2007-6207

Disclosure Date: December 04, 2007 (last updated October 04, 2023)
Xen 3.x, possibly before 3.1.2, when running on IA64 systems, does not check the RID value for mov_to_rr, which allows a VTi domain to read memory of other domains.
0
Attacker Value
Unknown

CVE-2007-5907

Disclosure Date: November 09, 2007 (last updated October 04, 2023)
Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).
0