Логотип exploitDog
bind:CVE-2020-11741
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-11741

Количество 14

Количество 14

ubuntu логотип

CVE-2020-11741

почти 6 лет назад

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2020-11741

почти 6 лет назад

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2020-11741

почти 6 лет назад

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2020-11741

почти 6 лет назад

An issue was discovered in xenoprof in Xen through 4.13.x, allowing gu ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xqc2-qqq8-xfj5

больше 3 лет назад

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0599-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2234-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1124-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1634-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1139-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1138-1

почти 6 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14448-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1630-1

больше 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14444-1

больше 5 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-11741

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2020-11741

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.

CVSS3: 8.1
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2020-11741

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2020-11741

An issue was discovered in xenoprof in Xen through 4.13.x, allowing gu ...

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-xqc2-qqq8-xfj5

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0599-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:2234-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1124-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1634-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1139-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1138-1

Security update for xen

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:14448-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1630-1

Security update for xen

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14444-1

Security update for xen

больше 5 лет назад

Уязвимостей на страницу