Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3259

Опубликовано: 16 июл. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.

РелизСтатусПримечание
devel

not-affected

4.5.1-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.2]]
precise

released

4.1.6.1-0ubuntu0.12.04.6
trusty

released

4.4.2-0ubuntu0.14.04.2
trusty/esm

DNE

trusty was released [4.4.2-0ubuntu0.14.04.2]
upstream

needs-triage

utopic

ignored

end of life
vivid

released

4.5.0-1ubuntu4.2
wily

not-affected

4.5.1-0ubuntu1

Показывать по

EPSS

Процентиль: 18%
0.00056
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.

nvd
больше 10 лет назад

Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.

debian
больше 10 лет назад

Stack-based buffer overflow in the xl command line utility in Xen 4.1. ...

github
больше 3 лет назад

Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.

suse-cvrf
больше 10 лет назад

Security update for xen

EPSS

Процентиль: 18%
0.00056
Низкий

6.8 Medium

CVSS2