12 lines
No EOL
621 B
Text
Executable file
12 lines
No EOL
621 B
Text
Executable file
source: http://www.securityfocus.com/bid/25825/info
|
|
|
|
Xen is prone to a local command-injection vulnerability that can lead to privilege escalation.
|
|
|
|
This issue occurs because the application fails to validate input in the 'tools/pygrub/src/GrubConf.py' script.
|
|
|
|
This vulnerability affects Xen 3.0.3; other versions may be affected as well.
|
|
|
|
An attacker can exploit this issue by including Python commands in a configuration file using filesystem utilities. The following proof of concept is available:
|
|
|
|
Change the 'default' statement in grub.conf to:
|
|
default "+str(0*os.system(" insert evil command here "))+" |