The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and earlier, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/28643 | third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9840 | vdb entry signature |
http://xenbits.xensource.com/ext/ia64/xen-unstable.hg?rev/e6069a715fd7 | exploit |
http://www.securityfocus.com/bid/26954 | vdb entry |
http://secunia.com/advisories/28146 | third party advisory |
http://osvdb.org/41344 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2008-0089.html | vendor advisory |