1.2
CVSSv2

CVE-2013-1442

Published: 30/09/2013 Updated: 07/01/2017
CVSS v2 Base Score: 1.2 | Impact Score: 2.9 | Exploitability Score: 1.9
VMScore: 107
Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Summary

Xen 4.0 up to and including 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.0.0

xen xen 4.1.3

xen xen 4.1.4

xen xen 4.0.1

xen xen 4.0.2

xen xen 4.1.5

xen xen 4.2.0

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.1.2

xen xen 4.2.3

xen xen 4.3.0

xen xen 4.0.3

xen xen 4.0.4

xen xen 4.2.1

xen xen 4.2.2

Vendor Advisories

Multiple security issues have been discovered in the Xen virtualisation solution which may result in information leaks or denial of service For the stable distribution (wheezy), these problems have been fixed in version 414-3+deb7u2 For the unstable distribution (sid), these problems will be fixed soon We recommend that you upgrade your xen pa ...
Xen 40 through 43x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers ...