First published: Fri Apr 18 2008(Updated: )
Buffer overflow in the backend of XenSource Xen Para Virtualized Frame Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted description of a shared framebuffer.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xen | <0:3.0.3-41.el5_1.5 | 0:3.0.3-41.el5_1.5 |
Red Hat Desktop-file-utils | =5 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Virtualization Server | =5 | |
XenServer | =3.0 | |
XenServer | =3.0.2 | |
XenServer | =3.0.3 | |
XenServer | =3.0.4 | |
XenServer | =3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1943 has been classified with a moderate severity due to the potential for local denial of service and arbitrary code execution.
To mitigate CVE-2008-1943, upgrade to the patched version 0:3.0.3-41.el5_1.5 of the xen package.
CVE-2008-1943 affects XenSource Xen Para Virtualized Frame Buffer (PVFB) versions 3.0 through 3.1.2.
CVE-2008-1943 primarily allows local users to exploit the vulnerability, which could potentially lead to remote implications if exploited by a local user.
Currently, the recommended action to address CVE-2008-1943 is to apply the available updates, as no specific workaround has been provided.