First published: Wed May 21 2008(Updated: )
Description of problem: The recent fix to validate the frontend's frame buffer description neglected to limit the frame buffer size correctly. This lets a malicious frontend make the backend attempt to map an arbitrary amount of guest memory, which could be useful for a denial of service attack against dom0. Proposed upstream patch: <a href="http://xenbits.xensource.com/xen-unstable.hg?rev/9044705960cb30cec385bdca7305bcf7db096721">http://xenbits.xensource.com/xen-unstable.hg?rev/9044705960cb30cec385bdca7305bcf7db096721</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Project Xen Hypervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-447759 is considered high due to the potential for denial of service attacks.
To fix REDHAT-BUG-447759, apply the latest patches provided by the Xen Project for the affected hypervisor.
The vulnerability REDHAT-BUG-447759 affects users of the Xen Project Xen Hypervisor.
A malicious frontend can exploit REDHAT-BUG-447759 by causing the backend to map an arbitrary amount of guest memory.
REDHAT-BUG-447759 can potentially lead to denial of service attacks against the Xen hypervisor.