MEDIUM · 6.8

CVE-2015-3259

Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.

Vulnerability Description

Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.

CVSS Score

6.8

MEDIUM

AV:L/AC:L/Au:S/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
XenXen4.1.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-3259?

CVE-2015-3259 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.

How severe is CVE-2015-3259?

CVE-2015-3259 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-3259?

Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.