[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-5242Date: (C)2016-06-13   (M)2023-12-22


The p2m_teardown function in arch/arm/p2m.c in Xen 4.4.x through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (NULL pointer dereference and host OS crash) by creating concurrent domains and holding references to them, related to VMID exhaustion.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.6CVSS Score : 4.7
Exploit Score: 1.1Exploit Score: 3.4
Impact Score: 4.0Impact Score: 6.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: CHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: COMPLETE
Integrity: NONE 
Availability: HIGH 
  
Reference:
SECTRACK-1036035
BID-91015
DSA-3633
http://xenbits.xen.org/xsa/advisory-181.html

CPE    8
cpe:/o:xen:xen:4.4.0:rc1
cpe:/o:xen:xen:4.5.0
cpe:/o:xen:xen:4.4.1
cpe:/o:xen:xen:4.5.2
...
OVAL    2
oval:org.secpod.oval:def:602568
oval:org.secpod.oval:def:110619

© SecPod Technologies