Lucene search

K
xenXen ProjectXSA-78
HistoryNov 20, 2013 - 5:08 p.m.

Insufficient TLB flushing in VT-d (iommu) code

2013-11-2017:08:00
Xen Project
xenbits.xen.org
28

7.9 High

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

55.6%

ISSUE DESCRIPTION

An inverted boolean parameter resulted in TLB flushes not happening upon clearing of a present translation table entry. Retaining stale TLB entries could allow guests access to memory that ought to have been revoked, or grant greater access than intended.

IMPACT

Malicious guest administrators might be able to cause host-wide denial of service, or escalate their privilege to that of the host.

VULNERABLE SYSTEMS

Xen 4.2.x and later are vulnerable. Xen 4.1.x and earlier are not vulnerable.
Only systems using Intel VT-d for PCI passthrough are vulnerable.

CPENameOperatorVersion
xenge4.2.x

7.9 High

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

55.6%