Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4368

Опубликовано: 10 окт. 2013
Источник: redhat
CVSS2: 2.3
EPSS Низкий

Описание

The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1012550xen: information leak through outs instruction emulation (XSA-67)

EPSS

Процентиль: 28%
0.00094
Низкий

2.3 Low

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.

nvd
больше 11 лет назад

The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.

debian
больше 11 лет назад

The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier ...

github
около 3 лет назад

The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.

oracle-oval
больше 11 лет назад

ELSA-2013-1449: kernel security and bug fix update (MODERATE)

EPSS

Процентиль: 28%
0.00094
Низкий

2.3 Low

CVSS2