7.1
CVSSv2

CVE-2014-9030

Published: 24/11/2014 Updated: 30/10/2018
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
VMScore: 632
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x up to and including 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 3.2.0

xen xen 3.4.0

xen xen 3.4.1

xen xen 4.0.3

xen xen 4.0.4

xen xen 4.2.0

xen xen 4.2.1

xen xen 3.2.3

xen xen 3.2.1

xen xen 3.2.2

xen xen 3.4.2

xen xen 3.4.3

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.1.2

xen xen 4.2.2

xen xen 4.2.3

xen xen 3.3.0

xen xen 3.4.4

xen xen 4.0.0

xen xen 4.1.3

xen xen 4.1.4

xen xen 4.3.0

xen xen 4.3.1

xen xen 3.3.1

xen xen 3.3.2

xen xen 4.0.1

xen xen 4.0.2

xen xen 4.1.5

xen xen 4.1.6.1

xen xen 4.4.0

xen xen 4.4.1

debian debian linux 7.0

opensuse opensuse 13.2

opensuse opensuse 13.1

Vendor Advisories

Debian Bug report logs - #770230 xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 19 Nov 2014 22:48:01 UTC Severity: important Tags ...
Multiple security issues have been discovered in the Xen virtualisation solution which may result in denial of service, information disclosure or privilege escalation CVE-2014-8594 Roger Pau Monne and Jan Beulich discovered that incomplete restrictions on MMU update hypercalls may result in privilege escalation CVE-2014-8595 Jan ...