First published: Fri Sep 25 2009(Updated: )
pyGrub bootloader used to boot Xen para-virtualized guests did not have support for password command as supported by normal grub. If this option was used in grub.conf, it did not restrict users with access to para-virtualized guest's console from booting guest or changing kernel boot parameters without providing configured password. This could allow user with access to VMs console to get root privileges on the guest's operating system. Upstream patches: ----------------- <a href="http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3">http://xenbits.xensource.com/xen-unstable.hg?rev/8f783adc0ee3</a> <a href="http://xenbits.xensource.com/staging/xen-unstable.hg?rev/a28c9c2fa8de">http://xenbits.xensource.com/staging/xen-unstable.hg?rev/a28c9c2fa8de</a> <a href="http://xenbits.xensource.com/xen-unstable.hg?rev/e513d565c8f1">http://xenbits.xensource.com/xen-unstable.hg?rev/e513d565c8f1</a> <a href="http://xenbits.xensource.com/xen-unstable.hg?rev/67f1b8b32585">http://xenbits.xensource.com/xen-unstable.hg?rev/67f1b8b32585</a> <a href="http://xenbits.xensource.com/xen-unstable.hg?rev/168f0cfeded0">http://xenbits.xensource.com/xen-unstable.hg?rev/168f0cfeded0</a> CVE Request: ------------ <a href="http://www.openwall.com/lists/oss-security/2009/09/25/1">http://www.openwall.com/lists/oss-security/2009/09/25/1</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =3.0.3 | |
Xen xen-unstable | =3.3.0 | |
Xen xen-unstable | =3.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3525 is considered a medium-severity vulnerability due to unauthorized access to the grub command line.
To fix CVE-2009-3525, upgrade to a version of Xen that implements password protection for para-virtualized guest consoles.
CVE-2009-3525 affects Xen versions 3.0.3, 3.3.0, and 3.3.1.
The impact of CVE-2009-3525 allows unauthorized users to modify the kernel boot parameters or boot the guest without restriction.
Disabling access to the para-virtualized guest's console can serve as a temporary workaround for CVE-2009-3525 until a proper update is applied.