CVE-2015-2152
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
18/03/2015
Last modified:
12/04/2025
Description
Xen 4.5.x and earlier enables certain default backends when emulating a VGA device for an x86 HVM guest qemu even when the configuration disables them, which allows local guest users to obtain access to the VGA console by (1) setting the DISPLAY environment variable, when compiled with SDL support, or connecting to the VNC server on (2) ::1 or (3) 127.0.0.1, when not compiled with SDL support.
Impact
Base Score 2.0
1.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | 4.5.0 (including) | |
| cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html
- http://www.securityfocus.com/bid/73068
- http://www.securitytracker.com/id/1031806
- http://www.securitytracker.com/id/1031919
- http://xenbits.xen.org/xsa/advisory-119.html
- https://security.gentoo.org/glsa/201504-04
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html
- http://www.securityfocus.com/bid/73068
- http://www.securitytracker.com/id/1031806
- http://www.securitytracker.com/id/1031919
- http://xenbits.xen.org/xsa/advisory-119.html
- https://security.gentoo.org/glsa/201504-04



