First published: Thu Oct 17 2013(Updated: )
The ocaml binding for the xc_vcpu_getaffinity function in Xen 4.2.x and 4.3.x frees certain memory that may still be intended for use, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors that trigger a (1) use-after-free or (2) double free.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4370 is considered a high severity vulnerability due to its potential to cause denial of service and arbitrary code execution.
To fix CVE-2013-4370, upgrade to a non-vulnerable version of Xen, specifically versions 4.2.x beyond 4.2.3 or any 4.3.x version.
CVE-2013-4370 affects users of Xen versions 4.2.0 to 4.2.3 and 4.3.0.
The consequences of CVE-2013-4370 include heap corruption, system crashes, and potential exploitation for arbitrary code execution.
CVE-2013-4370 is primarily a local vulnerability, meaning it is exploitable only by users with local access to the affected system.