3.3
CVSSv2

CVE-2014-7156

Published: 02/10/2014 Updated: 30/10/2018
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
VMScore: 294
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x up to and including 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 3.3.1

xen xen 3.3.2

xen xen 4.1.6.1

xen xen 4.2.0

xen xen 4.2.1

xen xen 4.4.1

xen xen 3.3.0

xen xen 4.1.4

xen xen 4.1.5

xen xen 4.4.0

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.3.0

xen xen 4.3.1

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.2.2

xen xen 4.2.3

Vendor Advisories

Multiple security issues have been discovered in the Xen virtualisation solution which may result in denial of service, information disclosure or privilege escalation For the stable distribution (wheezy), these problems have been fixed in version 414-3+deb7u3 For the unstable distribution (sid), these problems will be fixed soon We recommend t ...
The x86_emulate function in arch/x86/x86_emulate/x86_emulatec in Xen 33x through 44x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors ...