4.7
CVSSv2

CVE-2014-8866

Published: 01/12/2014 Updated: 30/10/2018
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
VMScore: 418
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

The compatibility mode hypercall argument translation in Xen 3.3.x up to and including 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 7.0

xen xen 3.3.2

xen xen 3.4.0

xen xen 3.4.1

xen xen 4.0.3

xen xen 4.0.4

xen xen 4.1.6.1

xen xen 4.2.0

xen xen 3.3.0

xen xen 3.3.1

xen xen 4.0.1

xen xen 4.0.2

xen xen 4.1.4

xen xen 4.1.5

xen xen 4.3.1

xen xen 4.4.0

xen xen 3.4.2

xen xen 3.4.3

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.2.1

xen xen 4.2.2

xen xen 3.4.4

xen xen 4.0.0

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.2.3

xen xen 4.3.0

opensuse opensuse 13.1

opensuse opensuse 13.2

Vendor Advisories

Debian Bug report logs - #770230 xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 19 Nov 2014 22:48:01 UTC Severity: important Tags ...
Multiple security issues have been discovered in the Xen virtualisation solution which may result in denial of service, information disclosure or privilege escalation CVE-2014-8594 Roger Pau Monne and Jan Beulich discovered that incomplete restrictions on MMU update hypercalls may result in privilege escalation CVE-2014-8595 Jan ...