7.4
CVSSv2

CVE-2011-1898

Published: 12/08/2011 Updated: 26/10/2011
CVSS v2 Base Score: 7.4 | Impact Score: 10 | Exploitability Score: 4.4
VMScore: 659
Vector: AV:A/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

Xen 4.1 prior to 4.1.1 and 4.0 prior to 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

citrix xen 4.0.0

citrix xen 4.0.1

citrix xen 4.1.0

Vendor Advisories

Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues, several bugs,and add one enhancement are now available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues and various bugsare now available for Red Hat Enterprise Linux 56 Extended Update SupportThe Red Hat Security Response Team has rated this update ...
Several vulnerabilities were discovered in the Xen virtual machine hypervisor CVE-2011-1166 A 64-bit guest can get one of its vCPUs into non-kernel mode without first providing a valid non-kernel pagetable, thereby locking up the host system CVE-2011-1583, CVE-2011-3262 Local users can cause a denial of service and possibly execute arb ...