Release date:
Updated on: 2013-06-10
Affected Systems:
Xenproject Xen
Description:
--------------------------------------------------------------------------------
Bugtraq id: 60422
Xen is an open-source Virtual Machine monitor developed by the University of Cambridge.
Xen's ELF parser has multiple integer overflow, indirect pointer reference, and other vulnerabilities. If a malicious PV domain administrator can specify his or her own kernel, it can escalate its permissions to the domain building tool, in addition, if the malicious HVM domain administrator can provide "hvmloader", the permission can also be improved. Attackers can exploit these vulnerabilities to load malicious kernels or firmware, damage the libelf memory, and increase the privileges on the host system.
<* Source: Xen.org security team (security@xen.org)
Link: http://seclists.org/oss-sec/2013/q2/516
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Xenproject
----------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.xenproject.org/