LOW · 3.3

CVE-2014-3715

Buffer overflow in Xen 4.4.x allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit guest kernel, related to searching for an appended DTB.

Vulnerability Description

Buffer overflow in Xen 4.4.x allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit guest kernel, related to searching for an appended DTB.

CVSS Score

3.3

LOW

AV:L/AC:M/Au:N/C:P/I:N/A:P
Confidentiality
PARTIAL
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
XenXen4.4.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3715?

CVE-2014-3715 is a vulnerability with a CVSS score of 3.3 (LOW). Buffer overflow in Xen 4.4.x allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit guest kernel, related to searching for an appended DTB.

How severe is CVE-2014-3715?

CVE-2014-3715 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3715?

Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.