First published: Mon May 19 2014(Updated: )
Buffer overflow in Xen 4.4.x allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit guest kernel, related to searching for an appended DTB.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3715 has a high severity rating due to the potential for local users to read sensitive system memory or cause a denial of service.
To fix CVE-2014-3715, upgrade to a patched version of Xen that addresses this vulnerability.
CVE-2014-3715 affects local users of Xen 4.4.0 and its release candidates that run crafted 32-bit guest kernels.
Exploitation of CVE-2014-3715 can lead to reading sensitive memory information or crashing the Xen hypervisor.
According to CVE-2014-3715, Xen versions 4.4.0 and 4.4.0-rc1 are vulnerable.