Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3717

Опубликовано: 19 мая 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.3

Описание

Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.

РелизСтатусПримечание
devel

released

4.4.0-0ubuntu6
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.0-0ubuntu5.1]]
lucid

DNE

precise

not-affected

quantal

not-affected

saucy

not-affected

trusty

released

4.4.0-0ubuntu5.1
trusty/esm

DNE

trusty was released [4.4.0-0ubuntu5.1]
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

not-affected

precise

DNE

quantal

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

ignored

end of life

Показывать по

EPSS

Процентиль: 40%
0.00183
Низкий

3.3 Low

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.

debian
больше 11 лет назад

Xen 4.4.x does not properly validate the load address for 64-bit ARM g ...

github
больше 3 лет назад

Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.

EPSS

Процентиль: 40%
0.00183
Низкий

3.3 Low

CVSS2