First published: Thu Jul 16 2015(Updated: )
Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.1.0 | |
Xen xen-unstable | =4.1.1 | |
Xen xen-unstable | =4.1.2 | |
Xen xen-unstable | =4.1.3 | |
Xen xen-unstable | =4.1.4 | |
Xen xen-unstable | =4.1.5 | |
Xen xen-unstable | =4.1.6.1 | |
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 | |
Xen xen-unstable | =4.3.4 | |
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 | |
Xen xen-unstable | =4.4.1 | |
Xen xen-unstable | =4.4.2 | |
Xen xen-unstable | =4.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3259 has a medium severity rating due to its potential to allow privilege escalation for local guest administrators.
To fix CVE-2015-3259, ensure you upgrade to a version of Xen that is not vulnerable, specifically 4.5.0 or later.
CVE-2015-3259 affects local guest administrators using Xen versions 4.1.x through 4.5.x.
CVE-2015-3259 is a stack-based buffer overflow vulnerability.
No, CVE-2015-3259 requires local access to the system to exploit the vulnerability.