Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-3687

Опубликовано: 14 авг. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8

Описание

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.

РелизСтатусПримечание
dapper

not-affected

not compiled with XSM:FLASK
devel

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

not-affected

not compiled with XSM:FLASK
gutsy

DNE

hardy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

not compiled with XSM:FLASK
feisty

DNE

gutsy

not-affected

not compiled with XSM:FLASK
hardy

not-affected

not compiled with XSM:FLASK
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

not compiled with XSM:FLASK
feisty

DNE

gutsy

DNE

hardy

not-affected

not compiled with XSM:FLASK
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 81%
0.01613
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

nvd
больше 17 лет назад

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.

debian
больше 17 лет назад

Heap-based buffer overflow in the flask_security_label function in Xen ...

github
почти 4 года назад

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.

EPSS

Процентиль: 81%
0.01613
Низкий

6.8 Medium

CVSS2