Lucene search

K
xenXen ProjectXSA-27
HistoryDec 03, 2012 - 5:51 p.m.

several HVM operations do not validate the range of their inputs

2012-12-0317:51:00
Xen Project
xenbits.xen.org
41

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

31.0%

ISSUE DESCRIPTION

Several HVM control operations do not check the size of their inputs and can tie up a physical CPU for extended periods of time.
In addition dirty video RAM tracking involves clearing the bitmap provided by the domain controlling the guest (e.g. dom0 or a stubdom). If the size of that bitmap is overly large, an intermediate variable on the hypervisor stack may overflow that stack.

IMPACT

A malicious guest administrator can cause Xen to become unresponsive or to crash leading in either case to a Denial of Service.

VULNERABLE SYSTEMS

All Xen versions from 3.4 onwards are vulnerable.
However Xen 4.2 and unstable are not vulnerable to the stack overflow. Systems running either of these are not vulnerable to the crash.
Version 3.4, 4.0 and 4.1 are vulnerable to both the stack overflow and the physical CPU hang.
The vulnerability is only exposed to HVM guests.

CPENameOperatorVersion
xenge3.4
xeneq3.4
xeneq4.0
xeneq4.1

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

31.0%