CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
32.6%
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka “Linux pciback missing sanity checks.”
Vendor | Product | Version | CPE |
---|---|---|---|
xen | xen | 3.1.3 | cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:* |
xen | xen | 3.1.4 | cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:* |
xen | xen | 3.2.0 | cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:* |
xen | xen | 3.2.1 | cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:* |
xen | xen | 3.2.2 | cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:* |
xen | xen | 3.2.3 | cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:* |
xen | xen | 3.3.0 | cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:* |
xen | xen | 3.3.1 | cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:* |
xen | xen | 3.3.2 | cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:* |
xen | xen | 3.4.0 | cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
www.debian.org/security/2016/dsa-3434
www.securityfocus.com/bid/79546
www.securitytracker.com/id/1034480
xenbits.xen.org/xsa/advisory-157.html
security.gentoo.org/glsa/201604-03
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
32.6%