[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-0153Date: (C)2013-02-15   (M)2024-04-19


The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.7
Exploit Score: 3.4
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: COMPLETE
  
Reference:
SECUNIA-51881
SECUNIA-55082
BID-57745
OSVDB-89867
DSA-2636
GLSA-201309-24
RHSA-2013:0847
SUSE-SU-2014:0446
http://www.openwall.com/lists/oss-security/2013/02/05/7
openSUSE-SU-2013:0636
openSUSE-SU-2013:0637
openSUSE-SU-2013:0912
xen-amdiommu-dos(81831)

CPE    8
cpe:/o:xen:xen:4.1.0
cpe:/o:xen:xen:4.1.4
cpe:/o:xen:xen:4.1.3
cpe:/o:xen:xen:4.2.1
...
OVAL    34
oval:org.secpod.oval:def:501060
oval:org.secpod.oval:def:600978
oval:org.secpod.oval:def:1500181
oval:org.secpod.oval:def:1500180
...

© SecPod Technologies