[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-2756Date: (C)2015-04-07   (M)2023-12-22


QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.9
Exploit Score: 3.9
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: COMPLETE
  
Reference:
SECTRACK-1031998
BID-72577
DSA-3259
FEDORA-2015-5208
FEDORA-2015-5295
FEDORA-2015-5402
GLSA-201504-04
USN-2608-1
http://lists.nongnu.org/archive/html/qemu-devel/2015-03/msg06179.html
http://support.citrix.com/article/CTX201145
http://xenbits.xen.org/xsa/advisory-126.html
https://support.citrix.com/article/CTX206006
openSUSE-SU-2015:0732

CPE    12
cpe:/o:fedoraproject:fedora:20
cpe:/o:fedoraproject:fedora:21
cpe:/o:debian:debian_linux:7.0
cpe:/o:debian:debian_linux:8.0
...
CWE    1
CWE-264
OVAL    14
oval:org.secpod.oval:def:108686
oval:org.secpod.oval:def:108802
oval:org.secpod.oval:def:108681
oval:org.secpod.oval:def:108883
...

© SecPod Technologies