ID CVE-2011-1763
Summary The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.
References
Vulnerable Configurations
  • cpe:2.3:a:xen:xen:*:*:*:*:*:*:*:*
    cpe:2.3:a:xen:xen:*:*:*:*:*:*:*:*
CVSS
Base: 7.7 (as of 03-09-2015 - 14:20)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:A/AC:L/Au:S/C:C/I:C/A:C
redhat via4
advisories
bugzilla
id 701240
title CVE-2011-1763 kernel: xen: improper upper boundary check in get_free_port() function
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331005
    • OR
      • comment kernel earlier than 0:2.6.18-238.12.1.el5 is currently running
        oval oval:com.redhat.rhsa:tst:20110833025
      • comment kernel earlier than 0:2.6.18-238.12.1.el5 is set to boot up on next boot
        oval oval:com.redhat.rhsa:tst:20110833026
    • OR
      • AND
        • comment kernel is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833001
        • comment kernel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314002
      • AND
        • comment kernel-PAE is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833003
        • comment kernel-PAE is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314004
      • AND
        • comment kernel-PAE-devel is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833005
        • comment kernel-PAE-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314006
      • AND
        • comment kernel-debug is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833007
        • comment kernel-debug is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314008
      • AND
        • comment kernel-debug-devel is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833009
        • comment kernel-debug-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314010
      • AND
        • comment kernel-devel is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833011
        • comment kernel-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314012
      • AND
        • comment kernel-doc is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833013
        • comment kernel-doc is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314014
      • AND
        • comment kernel-headers is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833015
        • comment kernel-headers is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314016
      • AND
        • comment kernel-kdump is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833017
        • comment kernel-kdump is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314018
      • AND
        • comment kernel-kdump-devel is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833019
        • comment kernel-kdump-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314020
      • AND
        • comment kernel-xen is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833021
        • comment kernel-xen is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314022
      • AND
        • comment kernel-xen-devel is earlier than 0:2.6.18-238.12.1.el5
          oval oval:com.redhat.rhsa:tst:20110833023
        • comment kernel-xen-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20080314024
rhsa
id RHSA-2011:0833
released 2011-05-31
severity Important
title RHSA-2011:0833: kernel security and bug fix update (Important)
rpms
  • kernel-0:2.6.18-238.12.1.el5
  • kernel-PAE-0:2.6.18-238.12.1.el5
  • kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5
  • kernel-PAE-devel-0:2.6.18-238.12.1.el5
  • kernel-debug-0:2.6.18-238.12.1.el5
  • kernel-debug-debuginfo-0:2.6.18-238.12.1.el5
  • kernel-debug-devel-0:2.6.18-238.12.1.el5
  • kernel-debuginfo-0:2.6.18-238.12.1.el5
  • kernel-debuginfo-common-0:2.6.18-238.12.1.el5
  • kernel-devel-0:2.6.18-238.12.1.el5
  • kernel-doc-0:2.6.18-238.12.1.el5
  • kernel-headers-0:2.6.18-238.12.1.el5
  • kernel-kdump-0:2.6.18-238.12.1.el5
  • kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5
  • kernel-kdump-devel-0:2.6.18-238.12.1.el5
  • kernel-xen-0:2.6.18-238.12.1.el5
  • kernel-xen-debuginfo-0:2.6.18-238.12.1.el5
  • kernel-xen-devel-0:2.6.18-238.12.1.el5
refmap via4
confirm
Last major update 03-09-2015 - 14:20
Published 07-01-2014 - 19:55
Last modified 03-09-2015 - 14:20
Back to Top