CVE-2014-1950

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified vectors.

References

http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html

http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html

http://www.debian.org/security/2014/dsa-3006

http://www.openwall.com/lists/oss-security/2014/02/12/17

http://xenbits.xen.org/xsa/advisory-88.html

Details

Source: MITRE

Published: 2014-02-14

Updated: 2014-12-12

Type: CWE-399

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.9

Severity: MEDIUM

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
84140OracleVM 3.2 : xen (OVMSA-2015-0068) (POODLE) (Venom)NessusOracleVM Local Security Checks
low
83613SUSE SLES11 Security Update : Xen (SUSE-SU-2014:0372-1)NessusSuSE Local Security Checks
high
77240Debian DSA-3006-1 : xen - security updateNessusDebian Local Security Checks
high
75312openSUSE Security Update : xen (openSUSE-SU-2014:0483-1)NessusSuSE Local Security Checks
high
73015SuSE 11.3 Security Update : Xen (SAT Patch Number 8973)NessusSuSE Local Security Checks
high
72766Fedora 19 : xen-4.2.4-2.fc19 (2014-2862)NessusFedora Local Security Checks
medium
72765Fedora 20 : xen-4.3.2-1.fc20 (2014-2802)NessusFedora Local Security Checks
medium