CVE-2008-4405
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
03/10/2008
Last modified:
09/04/2025
Description
xend in Xen 3.0.3 does not properly limit the contents of the /local/domain xenstore directory tree, and does not properly restrict a guest VM's write access within this tree, which allows guest OS users to cause a denial of service and possibly have unspecified other impact by writing to (1) console/tty, (2) console/limit, or (3) image/device-model-pid. NOTE: this issue was originally reported as an issue in libvirt 0.3.3 and xenstore, but CVE is considering the core issue to be related to Xen.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
- http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00992.html
- http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00994.html
- http://openwall.com/lists/oss-security/2008/09/30/6
- http://secunia.com/advisories/32064
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A016
- http://www.openwall.com/lists/oss-security/2008/10/04/3
- http://www.redhat.com/support/errata/RHSA-2009-0003.html
- http://www.securityfocus.com/bid/31499
- http://www.securitytracker.com/id?1020955=
- http://www.vupen.com/english/advisories/2008/2709
- http://xenbits.xensource.com/staging/xen-3.3-testing.hg?rev%2Fe0e17216ba70=
- https://bugzilla.redhat.com/show_bug.cgi?id=464817
- https://bugzilla.redhat.com/show_bug.cgi?id=464818
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10627
- http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
- http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00992.html
- http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00994.html
- http://openwall.com/lists/oss-security/2008/09/30/6
- http://secunia.com/advisories/32064
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A016
- http://www.openwall.com/lists/oss-security/2008/10/04/3
- http://www.redhat.com/support/errata/RHSA-2009-0003.html
- http://www.securityfocus.com/bid/31499
- http://www.securitytracker.com/id?1020955=
- http://www.vupen.com/english/advisories/2008/2709
- http://xenbits.xensource.com/staging/xen-3.3-testing.hg?rev%2Fe0e17216ba70=
- https://bugzilla.redhat.com/show_bug.cgi?id=464817
- https://bugzilla.redhat.com/show_bug.cgi?id=464818
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10627



