Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-18424
HistoryOct 31, 2019 - 12:00 a.m.

CVE-2019-18424

2019-10-3100:00:00
ubuntu.com
ubuntu.com
11

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

58.9%

An issue was discovered in Xen through 4.12.x allowing attackers to gain
host OS privileges via DMA in a situation where an untrusted domain has
access to a physical device. This occurs because passed through PCI devices
may corrupt host memory after deassignment. When a PCI device is assigned
to an untrusted domain, it is possible for that domain to program the
device to DMA to an arbitrary address. The IOMMU is used to protect the
host from malicious DMA by making sure that the device addresses can only
target memory assigned to the guest. However, when the guest domain is torn
down, or the device is deassigned, the device is assigned back to dom0,
thus allowing any in-flight DMA to potentially target critical host data.
An untrusted domain with access to a physical device can DMA into host
memory, leading to privilege escalation. Only systems where guests are
given direct access to physical devices capable of DMA (PCI pass-through)
are vulnerable. Systems which do not use PCI pass-through are not
vulnerable.

Notes

Author Note
mdeslaur hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchxen< anyUNKNOWN
ubuntu16.04noarchxen< anyUNKNOWN

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

58.9%