5.4
CVSSv2

CVE-2014-8594

Published: 19/11/2014 Updated: 30/10/2018
CVSS v2 Base Score: 5.4 | Impact Score: 6.9 | Exploitability Score: 4.9
VMScore: 481
Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C

Vulnerability Summary

The do_mmu_update function in arch/x86/mm.c in Xen 4.x up to and including 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opensuse opensuse 13.1

opensuse opensuse 13.2

debian debian linux 7.0

xen xen 4.0.0

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.1.4

xen xen 4.3.0

xen xen 4.3.1

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.2.2

xen xen 4.2.3

xen xen 4.0.1

xen xen 4.0.2

xen xen 4.1.5

xen xen 4.1.6.1

xen xen 4.0.3

xen xen 4.0.4

xen xen 4.2.0

xen xen 4.2.1

Vendor Advisories

Debian Bug report logs - #770230 xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 19 Nov 2014 22:48:01 UTC Severity: important Tags ...
Multiple security issues have been discovered in the Xen virtualisation solution which may result in denial of service, information disclosure or privilege escalation CVE-2014-8594 Roger Pau Monne and Jan Beulich discovered that incomplete restrictions on MMU update hypercalls may result in privilege escalation CVE-2014-8595 Jan ...
The do_mmu_update function in arch/x86/mmc in Xen 4x through 44x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP) ...