Lucene search

K
xenXen ProjectXSA-113
HistoryNov 20, 2014 - 4:26 p.m.

Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling

2014-11-2016:26:00
Xen Project
xenbits.xen.org
29

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.003 Low

EPSS

Percentile

68.9%

ISSUE DESCRIPTION

An error handling path in the processing of MMU_MACHPHYS_UPDATE failed to drop a page reference which was acquired in an earlier processing step.

IMPACT

Malicious or buggy stub domain kernels or tool stacks otherwise living outside of Domain0 can mount a denial of service attack which, if successful, can affect the whole system.
Only domains controlling HVM guests can exploit this vulnerability. (This includes domains providing hardware emulation services to HVM guests.)

VULNERABLE SYSTEMS

Xen versions from at least 3.2.x onwards are vulnerable on x86 systems. Older versions have not been inspected. ARM systems are not vulnerable.
This vulnerability is only applicable to Xen systems using stub domains or other forms of disaggregation of control domains for HVM guests.

CPENameOperatorVersion
xenge3.2.x

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.003 Low

EPSS

Percentile

68.9%