First published: Wed Aug 28 2013(Updated: )
Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.1.0 | |
Xen xen-unstable | =4.1.1 | |
Xen xen-unstable | =4.1.2 | |
Xen xen-unstable | =4.1.3 | |
Xen xen-unstable | =4.1.4 | |
Xen xen-unstable | =4.1.5 | |
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Debian GNU/Linux | =7.0 | |
Xen xen-unstable | =4.0.0 | |
Xen xen-unstable | =4.0.1 | |
Xen xen-unstable | =4.0.2 | |
Xen xen-unstable | =4.0.3 | |
Xen xen-unstable | =4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-2072 is classified as high due to the potential for local exploitation leading to memory corruption and privilege escalation.
CVE-2013-2072 affects these versions by allowing local administrators to exploit a buffer overflow in the xc_vcpu_setaffinity call.
Mitigation of CVE-2013-2072 can be achieved by applying the appropriate security patches provided for the impacted versions of Xen.
Exploitation of CVE-2013-2072 can lead to a denial of service due to the xend toolstack crash and could potentially allow privilege escalation.
Vulnerable versions of Xen include 4.0.0 through 4.2.2.