First published: Mon Apr 21 2008(Updated: )
Buffer overflow in the backend framebuffer of XenSource Xen Para-Virtualized Framebuffer (PVFB) Message 3.0 through 3.0.3 allows local users to cause a denial of service (SDL crash) and possibly execute arbitrary code via "bogus screen updates," related to missing validation of the "format of messages."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Desktop-file-utils | =5 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Virtualization Server | =5 | |
XenServer | =3.0 | |
XenServer | =3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1944 has a medium severity rating due to the potential for denial of service and arbitrary code execution.
To fix CVE-2008-1944, update your XenServer to a version later than 3.0.3 where the vulnerability has been patched.
CVE-2008-1944 affects XenServer versions 3.0 and 3.0.3, as well as some earlier versions of Red Hat Linux environments.
CVE-2008-1944 allows local users to perform a denial of service attack causing SDL crashes, and potentially execute arbitrary code.
CVE-2008-1944 is not exploitable remotely as it requires local user access to trigger the buffer overflow.