Vulnerabilities
Vulnerable Software
Xensource Inc:  Security Vulnerabilities
The ssm_i emulation in Xen 5.1 on IA64 architectures allows attackers to cause a denial of service (dom0 panic) via certain traffic, as demonstrated using an FTP stress test tool.
CVSS Score
4.3
EPSS Score
0.006
Published
2008-04-02
Xen 3.x, possibly before 3.1.2, when running on IA64 systems, does not check the RID value for mov_to_rr, which allows a VTi domain to read memory of other domains.
CVSS Score
2.1
EPSS Score
0.001
Published
2007-12-04
Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.
CVSS Score
4.7
EPSS Score
0.001
Published
2007-11-09
Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).
CVSS Score
4.7
EPSS Score
0.001
Published
2007-11-09
(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.
CVSS Score
6.0
EPSS Score
0.0
Published
2007-10-28
pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements.
CVSS Score
6.9
EPSS Score
0.002
Published
2007-09-27


Contact Us

Shodan ® - All rights reserved