Lucene search

K
xenXen ProjectXSA-123
HistoryMar 10, 2015 - 12:00 p.m.

Hypervisor memory corruption due to x86 emulator flaw

2015-03-1012:00:00
Xen Project
xenbits.xen.org
42

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

36.6%

ISSUE DESCRIPTION

Instructions with register operands ignore eventual segment overrides encoded for them. Due to an insufficiently conditional assignment such a bogus segment override can, however, corrupt a pointer used subsequently to store the result of the instruction.

IMPACT

A malicious guest might be able to read sensitive data relating to other guests, or to cause denial of service on the host. Arbitrary code execution, and therefore privilege escalation, cannot be excluded.

VULNERABLE SYSTEMS

Xen 3.2.x and later are vulnerable. Xen 3.1.x and earlier have not been inspected.
Only x86 systems are vulnerable. ARM systems are not vulnerable.

CPENameOperatorVersion
xenge3.2.x

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

36.6%