Vulnerability Name: | CVE-2011-1763 (CCN-67788) | ||||||||||||||||||||||||
Assigned: | 2011-05-31 | ||||||||||||||||||||||||
Published: | 2011-05-31 | ||||||||||||||||||||||||
Updated: | 2015-09-03 | ||||||||||||||||||||||||
Summary: | The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port. | ||||||||||||||||||||||||
CVSS v3 Severity: | 2.8 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.7 High (CVSS v2 Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C) 5.7 Medium (Temporal CVSS v2 Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
1.3 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)
4.8 Medium (REDHAT Temporal CVSS v2 Vector: AV:A/AC:H/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2011-1763 Source: CONFIRM Type: UNKNOWN http://downloads.avaya.com/css/P8/documents/100145416 Source: CCN Type: XenSource Web site Xen Source: CCN Type: RHSA-2011-0833 Important: kernel security and bug fix update Source: REDHAT Type: UNKNOWN RHSA-2011:0833 Source: CCN Type: SA44889 OpenVZ update for kernel Source: CCN Type: OpenVZ Web site OpenVZ Source: CCN Type: OSVDB ID: 74649 Linux Kernel Xen Hypervisor Implementation New Event Channel Port Handling Local Privilege Escalation Source: CCN Type: BID-48048 Xen 'get_free_port()' Denial of Service Vulnerability Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=701240 Source: XF Type: UNKNOWN xen-getfreeport-dos(67788) | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |