4.9
CVSSv2

CVE-2014-2599

Published: 28/03/2014 Updated: 07/01/2017
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The HVMOP_set_mem_access HVM control operations in Xen 4.1.x for 32-bit and 4.1.x up to and including 4.4.x for 64-bit allow local guest administrators to cause a denial of service (CPU consumption) by leveraging access to certain service domains for HVM guests and a large input.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.3.2

xen xen 4.4.0

xen xen 4.1.6.1

xen xen 4.2.0

xen xen 4.1.4

xen xen 4.1.3

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.2.1

xen xen 4.2.2

xen xen 4.1.2

xen xen 4.1.5

xen xen 4.2.3

xen xen 4.3.0

xen xen 4.3.1

Vendor Advisories

Debian Bug report logs - #757724 Multiple security issues Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 10 Aug 2014 20:21:01 UTC Severity: important Tags: fixed-upstream, security Merged with 751894 Fix ...
Debian Bug report logs - #751894 xen: CVE-2014-4021 / XSA-100 Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Henri Salo <henri@nervfi> Date: Tue, 17 Jun 2014 16:30:02 UTC Severity: important Tags: fixed-upstream, security Merged with 757724 Fixed in ...
Multiple security issues have been discovered in the Xen virtualisation solution which may result in information leaks or denial of service For the stable distribution (wheezy), these problems have been fixed in version 414-3+deb7u2 For the unstable distribution (sid), these problems will be fixed soon We recommend that you upgrade your xen pa ...