Vulnerability Details : CVE-2008-3687
Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2008-3687
Probability of exploitation activity in the next 30 days: 0.49%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-3687
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2008-3687
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-3687
-
Red Hat 2008-08-21Not vulnerable. This issue did not affect the version of Xen hypervisor as shipped with Red Hat Enterprise Linux 5, as it does not support XSM.
-
http://theinvisiblethings.blogspot.com/2008/08/our-xen-0wning-trilogy-highlights.html
-
http://www.vupen.com/english/advisories/2008/2426
-
http://invisiblethingslab.com/bh08/part2.pdf
-
http://xenbits.xensource.com/xen-3.3-testing.hg?rev/fa66b33f975a
-
http://www.securityfocus.com/bid/30834
-
http://www.securitytracker.com/id?1020731
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44608
-
http://www.nabble.com/-PATCH--XSM--FLASK--Argument-handling-bugs-in-XSM:FLASK-to18536032.html
Patch
- cpe:2.3:a:xen:xen:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:xen:xen_flask_module:*:*:*:*:*:*:*:*