CVE-2008-1944
Published May 14, 2008
Last updated 7 years ago
Overview
- Description
- Buffer overflow in the backend framebuffer of XenSource Xen Para-Virtualized Framebuffer (PVFB) Message 3.0 through 3.0.3 allows local users to cause a denial of service (SDL crash) and possibly execute arbitrary code via "bogus screen updates," related to missing validation of the "format of messages."
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Evaluator
- Comment
- -
- Impact
- https://bugzilla.redhat.com/show_bug.cgi?id=443078 "The PVFB backend is a user space program running as root in dom0"
- Solution
- https://bugzilla.redhat.com/show_bug.cgi?id=443078 "The PVFB backend is a user space program running as root in dom0"
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:desktop:5:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6C49CDB8-DC34-4791-B3B0-C1EAF0638B04" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:client:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3AA8F2EC-55E9-4529-A816-B5D495605F6B" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "40D71CBC-D365-4710-BAB5-8A1159F35E41" }, { "criteria": "cpe:2.3:o:redhat:virtualization_server:5:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6D84BCA5-7642-4638-98D9-482473FFCB14" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:xensource:xen:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6E5532C-4937-47C9-88DB-724106627030" }, { "criteria": "cpe:2.3:a:xensource:xen:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A90622F-17E0-4BE4-87A8-97135CC83141" } ], "operator": "OR" } ], "operator": "AND" } ]