CVE-2015-3259Improper Input Validation in XEN

Severity
6.8MEDIUMNVD
EPSS
0.1%
top 82.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 16
Latest updateMay 14

Description

Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.1 | Impact: 10.0

Affected Packages3 packages

debiandebian/xen< xen 4.6.0-1 (bookworm)
Debianxen/xen< 4.6.0-1+3
NVDxen/xen18 versions+17

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8m5p-xp4x-w5vh: Stack-based buffer overflow in the xl command line utility in Xen 42022-05-14
OSV
CVE-2015-3259: Stack-based buffer overflow in the xl command line utility in Xen 42015-07-16

📋Vendor Advisories

2
Red Hat
xen: xl command line config handling stack overflow (XSA-137)2015-07-07
Debian
CVE-2015-3259: xen - Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through ...2015

💬Community

2
Bugzilla
CVE-2015-3279 cups-filters: texttopdf integer overflow2015-07-03
Bugzilla
CVE-2015-3259 xen: xl command line config handling stack overflow (XSA-137)2015-07-01