The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 up to and including 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
xen xen 4.1.1 |
||
xen xen 4.1.2 |
||
xen xen 4.1.3 |
||
xen xen 4.2.3 |
||
xen xen 4.3.0 |
||
xen xen 4.1.0 |
||
xen xen 4.2.1 |
||
xen xen 4.2.2 |
||
xen xen 4.1.6.1 |
||
xen xen 4.2.0 |
||
xen xen 4.4.0 |
||
xen xen 4.4.1 |
||
xen xen 4.1.4 |
||
xen xen 4.1.5 |
||
xen xen 4.3.1 |
Anatomy of a nasty
Details of the mysterious Xen vulnerability, which prompted the Amazon AWS/Rackspace cloud reboots late last week, have been revealed, with patches already available. The CVE-2014-7188 vulnerability creates a way to trick the hypervisor into reading unallocated memory. "A buggy or malicious HVM [hardware virtual machine] guest can crash the host or read data relating to other guests or the hypervisor itself," an advisory by Xen developers explained. Fortunately, the flaw, discovered by Jan Beuli...