Lucene search

K
xenXen ProjectXSA-67
HistoryOct 10, 2013 - 12:00 p.m.

Information leak through outs instruction emulation

2013-10-1012:00:00
Xen Project
xenbits.xen.org
31

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

24.6%

ISSUE DESCRIPTION

The emulation of the outs instruction for 64-bit PV guests uses an uninitialized variable as the segment base for the source data if an FS: or GS: segment override is used, and if the segment descriptor the respective non-null selector in the corresponding selector register points to cannot be read by the emulation code (this is possible if the segment register was loaded before a more recent GDT or LDT update, i.e. the segment register contains stale data).
A malicious guest might be able to get hold of contents of the hypervisor stack, through the fault address passed to the page fault handler if the outs raises such a fault (which is mostly under guest control). Other methods for indirectly deducing information also exist.

IMPACT

A malicious 64-bit PV guest might conceivably gain access to sensitive data relating to other guests.

VULNERABLE SYSTEMS

Xen 3.1.x and later are vulnerable.
Only 64-bit PV guests can take advantage of this vulnerability.

CPENameOperatorVersion
xenge3.1.x

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

24.6%