First published: Thu Aug 14 2008(Updated: )
Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Xen flask module | ||
Xen xen-unstable | =3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3687 is considered a critical vulnerability due to its potential for allowing unprivileged domain users to execute arbitrary code.
To fix CVE-2008-3687, ensure that you apply patches or updates provided by Xen for the vulnerable XSM:FLASK module.
CVE-2008-3687 affects Xen 3.3 when compiled with the XSM:FLASK module.
Unprivileged domain users (domU) in a Xen environment are vulnerable to CVE-2008-3687.
CVE-2008-3687 is a heap-based buffer overflow vulnerability.