[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-1642Date: (C)2014-01-28   (M)2023-12-22


The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.4
Exploit Score: 3.4
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
OSVDB-102406
SECTRACK-1029679
SECUNIA-56557
BID-65097
FEDORA-2014-1552
FEDORA-2014-1559
GLSA-201407-03
SUSE-SU-2014:0373
http://www.openwall.com/lists/oss-security/2014/01/23/4
http://xenbits.xen.org/xsa/advisory-83.html
xen-irq-cve20141642-code-exec(90649)

CPE    6
cpe:/o:xen:xen:4.2.3
cpe:/o:xen:xen:4.2.2
cpe:/o:xen:xen:4.3.1
cpe:/o:xen:xen:4.2.1
...
CWE    1
CWE-399
OVAL    28
oval:org.secpod.oval:def:106340
oval:org.secpod.oval:def:106460
oval:org.secpod.oval:def:106361
oval:org.secpod.oval:def:106387
...

© SecPod Technologies