First published: Fri Feb 12 2010(Updated: )
Unspecified vulnerability in Citrix XenServer 5.0 Update 3 and earlier, and 5.5, allows local users to bypass authentication and execute unspecified Xen API (XAPI) calls via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
XenServer | <=5.0 | |
XenServer | =5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-0633 is classified as critical due to its potential for local users to bypass authentication.
To mitigate CVE-2010-0633, it is recommended to upgrade to a version of Citrix XenServer that is not affected, specifically beyond version 5.5.
CVE-2010-0633 affects local users of Citrix XenServer 5.0 Update 3 and earlier versions, as well as version 5.5.
Exploiting CVE-2010-0633 could allow unauthorized users to execute Xen API (XAPI) calls, potentially compromising the system.
CVE-2010-0633 was disclosed in early 2010 and affects specific versions of Citrix XenServer.