René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

224 lines
7.9 KiB
JSON

{
"id": "CVE-2015-8341",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-12-17T19:59:09.730",
"lastModified": "2017-07-01T01:29:25.203",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains."
},
{
"lang": "es",
"value": "La librer\u00eda libxl toolstack en Xen 4.1.x hasta la versi\u00f3n 4.6.x no libera adecuadamente el mapeo de archivos utilizados como kernels y ramdisks iniciales cuando manejan m\u00faltiples dominios en el mismo proceso, lo que permite a atacantes causar una denegaci\u00f3n de servicio (consumo de memoria y disco) mediante dominios de arranque."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0D532B60-C8DD-4A2F-9D05-E574D23EB754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5D83CA8B-8E49-45FA-8FAB-C15052474542"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27537DF5-7E0F-463F-BA87-46E329EE07AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA4F978-9145-4FE6-B4F9-15207E52C40A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "22A995FD-9B7F-4DF0-BECF-4B086E470F1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "219597E2-E2D7-4647-8A7C-688B96300158"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C59417-493C-493A-9AB2-317F240BF387"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65E55950-EACA-4209-B2A1-E09026FC6006"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F0AF8EF-6FF6-4E22-B16E-82C9F90C6B00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "47640819-FC43-49ED-8A77-728C3D7255B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2448537F-87AD-45C1-9FB0-7A49CA31BD76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E36B2265-70E1-413B-A7CF-79D39E9ADCFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "37148A72-BE20-45C5-8589-2309ED84D08C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FB736B4C-325A-4B27-8C8A-15E60B8A8C82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF948E6A-07BE-4C7D-8A98-002E89D35F4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0E23B94-1726-4F63-84BB-8D83FAB156D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C76124AB-4E3D-4BE0-AAEA-7FC05868E2FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F30B5EF5-0AE8-420B-A103-B1B25A372F09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F784EF07-DBEC-492A-A0F4-F9F7B2551A0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1044792C-D544-457C-9391-4F3B5BAB978D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FBD9AD01-50B7-4951-8A73-A6CF4801A487"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "89AA8FD5-E997-4F0D-AFB6-FFBE0073BA5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "75615D84-9CA1-456C-816D-768E37B074A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "90CCECD0-C0F9-45A8-8699-64428637EBCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F0ED340C-6746-471E-9F2D-19D62D224B7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99BD7C4F-DE4C-4508-B20D-46A94B616C5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4B6F7CE9-C409-4D88-9A99-B21420633F45"
}
]
}
]
}
],
"references": [
{
"url": "http://www.debian.org/security/2016/dsa-3519",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id/1034389",
"source": "cve@mitre.org"
},
{
"url": "http://xenbits.xen.org/xsa/advisory-160.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/201604-03",
"source": "cve@mitre.org"
}
]
}