5.8
CVSSv2

CVE-2014-7155

Published: 02/10/2014 Updated: 30/10/2018
CVSS v2 Base Score: 5.8 | Impact Score: 6.4 | Exploitability Score: 6.5
VMScore: 516
Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and previous versions does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 3.1.3

xen xen 3.1.4

xen xen 3.3.2

xen xen 3.4.0

xen xen 4.0.3

xen xen 4.0.4

xen xen 4.1.6.1

xen xen 4.2.0

xen xen 4.4.0

xen xen

xen xen 3.2.0

xen xen 3.2.1

xen xen 3.4.1

xen xen 3.4.2

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.2.1

xen xen 4.2.2

xen xen 3.0.3

xen xen 3.0.4

xen xen 3.3.0

xen xen 3.3.1

xen xen 4.0.0

xen xen 4.0.1

xen xen 4.0.2

xen xen 4.1.4

xen xen 4.1.5

xen xen 4.3.1

xen xen 3.0.2

xen xen 3.2.2

xen xen 3.2.3

xen xen 3.4.3

xen xen 3.4.4

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.2.3

xen xen 4.3.0

debian debian linux 7.0

fedoraproject fedora 19

fedoraproject fedora 20

opensuse opensuse 13.1

opensuse opensuse 12.3

Vendor Advisories

Multiple security issues have been discovered in the Xen virtualisation solution which may result in denial of service, information disclosure or privilege escalation For the stable distribution (wheezy), these problems have been fixed in version 414-3+deb7u3 For the unstable distribution (sid), these problems will be fixed soon We recommend t ...
The x86_emulate function in arch/x86/x86_emulate/x86_emulatec in Xen 44x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction ...