dtc-xen 0.5.x before 0.5.4 suffers from a race condition where an attacker could potentially get a bash access as xenXX user on the dom0, and then access a potentially reuse an already opened VPS console.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2009-4011 | third party advisory |
https://tracker.debian.org/media/packages/d/dtc-xen/changelog-0.5.17-1.1 | release notes product |
https://bugs.launchpad.net/ubuntu/+source/dtc-xen/+bug/505072 | third party advisory |