CVE-2013-2072

Xen - Memory Corruption

Title source: rule
STIX 2.1

Description

Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap.

Exploits (1)

nomisec WORKING POC
by bl4ck5un · poc
https://github.com/bl4ck5un/cve-2013-2072

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/59982
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106721.html
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2013/05/17/2
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106718.html
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2014/dsa-3041
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106778.html

Scores

EPSS 0.0036
EPSS Percentile 58.4%

Details

CWE
CWE-119
Status published
Products (15)
debian/debian_linux 7.0
xen/xen 4.1.0
xen/xen 4.1.1
xen/xen 4.1.2
xen/xen 4.1.3
xen/xen 4.1.4
xen/xen 4.1.5
xen/xen 4.2.0
xen/xen 4.2.1
xen/xen 4.2.2
... and 5 more
Published Aug 28, 2013
Tracked Since Feb 18, 2026