CVE-2007-4993

pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements.
References
Link Resource
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068
http://secunia.com/advisories/26986 Vendor Advisory
http://secunia.com/advisories/27047
http://secunia.com/advisories/27072
http://secunia.com/advisories/27085
http://secunia.com/advisories/27103
http://secunia.com/advisories/27141
http://secunia.com/advisories/27161
http://secunia.com/advisories/27486
http://www.debian.org/security/2007/dsa-1384
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
http://www.redhat.com/support/errata/RHSA-2007-0323.html
http://www.securityfocus.com/archive/1/481825/100/0/threaded
http://www.securityfocus.com/bid/25825
http://www.ubuntu.com/usn/usn-527-1
http://www.vupen.com/english/advisories/2007/3348
https://issues.rpath.com/browse/RPL-1752
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11240
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068
http://secunia.com/advisories/26986 Vendor Advisory
http://secunia.com/advisories/27047
http://secunia.com/advisories/27072
http://secunia.com/advisories/27085
http://secunia.com/advisories/27103
http://secunia.com/advisories/27141
http://secunia.com/advisories/27161
http://secunia.com/advisories/27486
http://www.debian.org/security/2007/dsa-1384
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
http://www.redhat.com/support/errata/RHSA-2007-0323.html
http://www.securityfocus.com/archive/1/481825/100/0/threaded
http://www.securityfocus.com/bid/25825
http://www.ubuntu.com/usn/usn-527-1
http://www.vupen.com/english/advisories/2007/3348
https://issues.rpath.com/browse/RPL-1752
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11240
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:xensource_inc:xen:3.0.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2007-09-27 17:17

Updated : 2025-04-09 00:30


NVD link : CVE-2007-4993

Mitre link : CVE-2007-4993

CVE.ORG link : CVE-2007-4993


JSON object : View

Products Affected

xensource_inc

  • xen
CWE
CWE-20

Improper Input Validation