7.2
CVSSv2

CVE-2015-2151

Published: 12/03/2015 Updated: 30/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The x86 emulator in Xen 3.2.x up to and including 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject fedora 22

fedoraproject fedora 21

fedoraproject fedora 20

debian debian linux 7.0

xen xen 3.2.0

xen xen 3.2.1

xen xen 3.4.2

xen xen 3.4.3

xen xen 4.1.0

xen xen 4.1.1

xen xen 4.2.1

xen xen 4.2.2

xen xen 3.2.2

xen xen 3.2.3

xen xen 3.4.4

xen xen 4.0.0

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.2.3

xen xen 4.3.0

xen xen 4.3.1

xen xen 3.3.0

xen xen 3.3.1

xen xen 3.3.2

xen xen 4.0.1

xen xen 4.0.2

xen xen 4.1.4

xen xen 4.1.5

xen xen 4.4.0

xen xen 3.4.0

xen xen 3.4.1

xen xen 4.0.3

xen xen 4.0.4

xen xen 4.1.6.1

xen xen 4.2.0

xen xen 4.4.1

xen xen 4.5.0

Vendor Advisories

Debian Bug report logs - #780227 XSA-123 / CVE-2015-2151 Hypervisor memory corruption due to x86 emulator flaw Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Josip Rodin <joy@debbugsentuzijastnet> Date: Tue, 10 Mar 2015 19:36:02 UTC Severity: critic ...
Multiple security issues have been found in the Xen virtualisation solution: CVE-2015-2044 Information leak via x86 system device emulation CVE-2015-2045 Information leak in the HYPERVISOR_xen_version() hypercall CVE-2015-2151 Missing input sanitising in the x86 emulator could result in information disclosure, denial of service o ...
It was found that the Xen hypervisor x86 CPU emulator implementation did not correctly handle certain instructions with segment overrides, potentially resulting in a memory corruption A malicious guest user could use this flaw to read arbitrary data relating to other guests, cause a denial of service on the host, or potentially escalate their priv ...