Lucene search

K
xenXen ProjectXSA-29
HistoryDec 03, 2012 - 5:51 p.m.

XENMEM_exchange may overwrite hypervisor memory

2012-12-0317:51:00
Xen Project
xenbits.xen.org
34

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

27.4%

ISSUE DESCRIPTION

The handler for XENMEM_exchange accesses guest memory without range checking the guest provided addresses, thus allowing these accesses to include the hypervisor reserved range.

IMPACT

A malicious guest administrator can cause Xen to crash. If the out of address space bounds access does not lead to a crash, a carefully crafted privilege escalation cannot be excluded, even though the guest doesn’t itself control the values written.

VULNERABLE SYSTEMS

All Xen versions are vulnerable.
The vulnerability is only exposed to PV guests.

CPENameOperatorVersion
xeneqany

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

27.4%