Lucene search

K
freebsdFreeBSD80ADC394-DDAF-11E5-B2BD-002590263BF5
HistoryJan 20, 2016 - 12:00 a.m.

xen-kernel -- VMX: intercept issue with INVLPG on non-canonical address

2016-01-2000:00:00
vuxml.freebsd.org
17

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

59.2%

The Xen Project reports:

While INVLPG does not cause a General Protection Fault when used on
a non-canonical address, INVVPID in its “individual address”
variant, which is used to back the intercepted INVLPG in certain
cases, fails in such cases. Failure of INVVPID results in a
hypervisor bug check.
A malicious guest can crash the host, leading to a Denial of
Service.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchxen-kernel= 3.3UNKNOWN
FreeBSDanynoarchxen-kernel< 4.5.2_2UNKNOWN

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

59.2%