Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-1952
Modified
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-23 Jun, 2008 | 19:41
Updated At-29 Sep, 2017 | 01:30

The backend for XenSource Xen Para Virtualized Frame Buffer (PVFB) in Xen ioemu does not properly restrict the frame buffer size, which allows attackers to cause a denial of service (crash) by mapping an arbitrary amount of guest memory.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

xensource
xensource
>>xen_para_virtualized_frame_buffer>>*
cpe:2.3:a:xensource:xen_para_virtualized_frame_buffer:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.xensource.com/archives/html/xen-devel/2008-05/msg00421.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/32088secalert@redhat.com
Vendor Advisory
http://www.openwall.com/lists/oss-security/2008/05/21/9secalert@redhat.com
Patch
http://www.securityfocus.com/bid/30646secalert@redhat.com
N/A
http://www.securitytracker.com/id?1020957secalert@redhat.com
N/A
http://xenbits.xensource.com/xen-unstable.hg?rev/9044705960cb30cec385bdca7305bcf7db096721secalert@redhat.com
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/43362secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11189secalert@redhat.com
N/A
https://rhn.redhat.com/errata/RHSA-2008-0892.htmlsecalert@redhat.com
N/A
Change History
0Changes found

Details not found