ID CVE-2010-2070
Summary arch/ia64/xen/faults.c in Xen 3.4 and 4.0 in Linux kernel 2.6.18, and possibly other kernel versions, when running on IA-64 architectures, allows local users to cause a denial of service and "turn on BE by modifying the user mask of the PSR," as demonstrated via exploitation of CVE-2006-0742.
References
Vulnerable Configurations
  • cpe:2.3:a:xensource:xen:3.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:xensource:xen:3.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:xensource:xen:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:xensource:xen:4.0.0:*:*:*:*:*:*:*
CVSS
Base: 4.9 (as of 10-10-2018 - 19:58)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:C
redhat via4
advisories
rhsa
id RHSA-2010:0610
rpms
  • kernel-0:2.6.18-194.11.1.el5
  • kernel-PAE-0:2.6.18-194.11.1.el5
  • kernel-PAE-debuginfo-0:2.6.18-194.11.1.el5
  • kernel-PAE-devel-0:2.6.18-194.11.1.el5
  • kernel-debug-0:2.6.18-194.11.1.el5
  • kernel-debug-debuginfo-0:2.6.18-194.11.1.el5
  • kernel-debug-devel-0:2.6.18-194.11.1.el5
  • kernel-debuginfo-0:2.6.18-194.11.1.el5
  • kernel-debuginfo-common-0:2.6.18-194.11.1.el5
  • kernel-devel-0:2.6.18-194.11.1.el5
  • kernel-doc-0:2.6.18-194.11.1.el5
  • kernel-headers-0:2.6.18-194.11.1.el5
  • kernel-kdump-0:2.6.18-194.11.1.el5
  • kernel-kdump-debuginfo-0:2.6.18-194.11.1.el5
  • kernel-kdump-devel-0:2.6.18-194.11.1.el5
  • kernel-xen-0:2.6.18-194.11.1.el5
  • kernel-xen-debuginfo-0:2.6.18-194.11.1.el5
  • kernel-xen-devel-0:2.6.18-194.11.1.el5
refmap via4
bid 40776
bugtraq 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
confirm
misc http://xenbits.xensource.com/xen-4.0-testing.hg?rev/42caadb14edb
mlist [oss-security] 20100611 CVE-2010-2070 kernel-xen: ia64-xen: unset be from the task psr
osvdb 65541
secunia 43315
xf xen-faults-dos(59373)
Last major update 10-10-2018 - 19:58
Published 16-06-2010 - 20:30
Last modified 10-10-2018 - 19:58
Back to Top