Lucene search

K
xenXen ProjectXSA-108
HistoryOct 01, 2014 - 12:00 p.m.

Improper MSR range used for x2APIC emulation

2014-10-0112:00:00
Xen Project
xenbits.xen.org
38

8.3 High

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

73.0%

ISSUE DESCRIPTION

The MSR range specified for APIC use in the x2APIC access model spans 256 MSRs. Hypervisor code emulating read and write accesses to these MSRs erroneously covered 1024 MSRs. While the write emulation path is written such that accesses to the extra MSRs would not have any bad effect (they end up being no-ops), the read path would (attempt to) access memory beyond the single page set up for APIC emulation.

IMPACT

A buggy or malicious HVM guest can crash the host or read data relating to other guests or the hypervisor itself.

VULNERABLE SYSTEMS

Xen 4.1 and onward are vulnerable.
Only x86 systems are vulnerable. ARM systems are not vulnerable.

CPENameOperatorVersion
xenge4.1

8.3 High

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

73.0%