Vulnerability Description
dtc-xen 0.5.x before 0.5.4 suffers from a race condition where an attacker could potentially get a bash access as xenXX user on the dom0, and then access a potentially reuse an already opened VPS console.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dtc-Xen Project | Dtc-Xen | >= 0.5.0, < 0.5.4 |
Related Weaknesses (CWE)
References
- https://bugs.launchpad.net/ubuntu/+source/dtc-xen/+bug/505072Third Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2009-4011Third Party Advisory
- https://tracker.debian.org/media/packages/d/dtc-xen/changelog-0.5.17-1.1ProductRelease Notes
- https://bugs.launchpad.net/ubuntu/+source/dtc-xen/+bug/505072Third Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2009-4011Third Party Advisory
- https://tracker.debian.org/media/packages/d/dtc-xen/changelog-0.5.17-1.1ProductRelease Notes
FAQ
What is CVE-2009-4011?
CVE-2009-4011 is a vulnerability with a CVSS score of 8.1 (HIGH). dtc-xen 0.5.x before 0.5.4 suffers from a race condition where an attacker could potentially get a bash access as xenXX user on the dom0, and then access a potentially reuse an already opened VPS cons...
How severe is CVE-2009-4011?
CVE-2009-4011 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4011?
Check the references section above for vendor advisories and patch information. Affected products include: Dtc-Xen Project Dtc-Xen.