First published: Fri Aug 12 2011(Updated: )
Multiple integer overflows in tools/libxc/xc_dom_bzimageloader.c in Xen 3.2, 3.3, 4.0, and 4.1 allow local users to cause a denial of service and possibly execute arbitrary code via a crafted paravirtualised guest kernel image that triggers (1) a buffer overflow during a decompression loop or (2) an out-of-bounds read in the loader involving unspecified length fields.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
XenServer | =3.2.0 | |
XenServer | =3.3.0 | |
XenServer | =4.1.0 | |
XenServer | =4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1583 has a high severity rating due to potential integer overflows that can lead to denial of service and arbitrary code execution.
To mitigate CVE-2011-1583, update your XenServer to a version that has patched the vulnerability, specifically versions beyond 4.1.0.
CVE-2011-1583 affects local users of Xen versions 3.2, 3.3, 4.0, and 4.1, particularly when handling crafted paravirtualized guest kernel images.
CVE-2011-1583 can be exploited through crafted paravirtualized guest kernel images that induce buffer overflows during decompression.
CVE-2011-1583 was disclosed in May 2011 as part of the ongoing security assessments for the Xen virtualization platform.