The ARM image loading functionality in Xen 4.4.x does not properly validate kernel length, which allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit ARM guest kernel in an image, which triggers a buffer overflow.
References
Link Resource
http://www.openwall.com/lists/oss-security/2014/05/14/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/05/15/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/05/16/1 Mailing List Third Party Advisory
http://www.securitytracker.com/id/1030252 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-95.html Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2014-05-19T14:00:00

Updated: 2014-06-06T12:57:01

Reserved: 2014-05-14T00:00:00


Link: CVE-2014-3714

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2014-05-19T14:55:12.377

Modified: 2018-10-30T16:26:53.700


Link: CVE-2014-3714

JSON object: View

cve-icon Redhat Information

No data.

CWE