[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-1936Date: (C)2014-01-10   (M)2023-12-22


Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.6
Exploit Score: 3.2
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: ADJACENT_NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: COMPLETE
  
Reference:
RHSA-2011:0927
[oss-security]
http://www.openwall.com/lists/oss-security/2011/07/07/3

CPE    1
cpe:/o:xen:xen:-
OVAL    3
oval:org.secpod.oval:def:500136
oval:org.secpod.oval:def:201572
oval:org.secpod.oval:def:201602

© SecPod Technologies