Lucene search

K
xenXen ProjectXSA-100
HistoryJun 17, 2014 - 11:44 a.m.

Hypervisor heap contents leaked to guests

2014-06-1711:44:00
Xen Project
xenbits.xen.org
28

2.7 Low

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:A/AC:L/Au:S/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

27.3%

ISSUE DESCRIPTION

While memory pages recovered from dying guests are being cleaned to avoid leaking sensitive information to other guests, memory pages that were in use by the hypervisor and are eligible to be allocated to guests weren’t being properly cleaned. Such exposure of information would happen through memory pages freshly allocated to or by the guest.
Normally the leaked data is administrative information of limited value to an attacker. However, scenarios exist where guest CPU register state and hypercall arguments might be leaked.

IMPACT

A malicious guest might be able to read data relating to other guests or the hypervisor itself.
Data at rest in guest memory or storage (filesystems) is not affected. However, it is possible for an attacker to obtain modest amounts of in-flight and in-use data, which might contain passwords or cryptographic keys.

VULNERABLE SYSTEMS

Xen 3.2.x and later are vulnerable. Xen 3.1.x and earlier have not been inspected.

CPENameOperatorVersion
xenge3.2.x

2.7 Low

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:A/AC:L/Au:S/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

27.3%