SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen Qemu Removable Media Code Bug Discloses Host Hypervisor Files to Local Users
SecurityTracker Alert ID:  1020959
SecurityTracker URL:  http://securitytracker.com/id/1020959
CVE Reference:   CVE-2008-1945   (Links to External Site)
Date:  Oct 2 2008
Impact:   Disclosure of system information, Disclosure of user information
Vendor Confirmed:  Yes  
Version(s): 3.3
Description:   A vulnerability was reported in Xen. A local user can view files on the host operating system in certain cases.

The QEMU block format auto-detection code allows a local user in a virtualized guest (DomU) to write a header to a Qemu image on removable media that describes another format. This can be exploited to read arbitrary files on the host operating system (Dom0).

Chris Wright reported this vulnerability.

Impact:   A local user on a guest operating system can read files on the host operating system.
Solution:   A source code fix is available at:

http://xenbits.xensource.com/xen-unstable.hg?rev/9044705960cb30cec385bdca7305bcf7db096721

Vendor URL:  xensource.com/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 2 2008 (Red Hat Issues Fix) Xen Qemu Removable Media Code Bug Discloses Host Hypervisor Files to Local Users
Red Hat has released a fix for Red Hat Enterprise Linux 5.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC