First published: Mon May 19 2014(Updated: )
Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3717 has a high severity rating due to its potential to allow local users to read sensitive system memory or crash the system.
To fix CVE-2014-3717, upgrade to a patched version of Xen that addresses this vulnerability.
CVE-2014-3717 affects systems running Xen version 4.4.0 and its release candidate, specifically on 64-bit ARM architectures.
The risks of CVE-2014-3717 include unauthorized access to memory leading to information disclosure or possible system crashes.
CVE-2014-3717 cannot be exploited remotely as it requires local access to the vulnerable system.