First published: Thu May 15 2008(Updated: )
The backend for XenSource Xen Para Virtualized Frame Buffer (PVFB) in Xen ioemu does not properly restrict the frame buffer size, which allows attackers to cause a denial of service (crash) by mapping an arbitrary amount of guest memory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xen | <0:3.0.3-64.el5_2.3 | 0:3.0.3-64.el5_2.3 |
XenSource Xen |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1952 is classified as a denial of service vulnerability which can lead to a system crash.
To mitigate CVE-2008-1952, update to the version 0:3.0.3-64.el5_2.3 or newer for the affected Xen package.
CVE-2008-1952 affects the XenSource Xen Para Virtualized Frame Buffer, specifically the older versions of the Xen package.
An attacker can exploit CVE-2008-1952 to map an arbitrary amount of guest memory, causing a denial of service.
Currently, the primary recommendation for CVE-2008-1952 is to apply the necessary updates rather than relying on a workaround.