4.7
CVSSv2

CVE-2013-0153

Published: 14/02/2013 Updated: 29/08/2017
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
VMScore: 418
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.2.0

xen xen 4.2.1

xen xen 4.1.4

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.1.0

xen xen 4.1.1

xen xen 3.3.0

Vendor Advisories

Multiple vulnerabilities have been discovered in the Xen hypervisor The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2012-4544 Insufficient validation of kernel or ramdisk sizes in the Xen PV domain builder could result in denial of service CVE-2012-5511 Several HVM control operations performed ...