7.8
CVSSv2

CVE-2015-4104

Published: 03/06/2015 Updated: 15/11/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Xen 3.3.x up to and including 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 3.3.2

xen xen 3.4.0

xen xen 4.0.2

xen xen 4.0.3

xen xen 4.1.5

xen xen 4.1.6.1

xen xen 4.2.0

xen xen 4.3.4

xen xen 4.4.0

xen xen 3.4.3

xen xen 3.4.4

xen xen 4.1.1

xen xen 4.1.2

xen xen 4.2.3

xen xen 4.3.0

xen xen 3.3.0

xen xen 3.3.1

xen xen 4.0.0

xen xen 4.0.1

xen xen 4.1.3

xen xen 4.1.4

xen xen 4.3.1

xen xen 4.3.2

xen xen 3.4.1

xen xen 3.4.2

xen xen 4.0.4

xen xen 4.1.0

xen xen 4.2.1

xen xen 4.2.2

xen xen 4.4.1

xen xen 4.5.0

Vendor Advisories

Several security issues were fixed in QEMU ...
Debian Bug report logs - #787547 CVE-2015-4103 CVE-2015-4104 CVE-2015-4105 CVE-2015-4106 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 2 Jun 2015 17:03:01 UTC Severity: grave Tags: fixed-upstream, p ...
Debian Bug report logs - #788460 qemu: CVE-2015-3209: heap overflow in QEMU PCNET controller (allowing guest->host escape) Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 11 Jun 2015 16:09:02 UT ...
Multiple security issues have been found in the Xen virtualisation solution: CVE-2015-3209 Matt Tait discovered a flaw in the way QEMU's AMD PCnet Ethernet emulation handles multi-TMD packets with a length above 4096 bytes A privileged guest user in a guest with an AMD PCNet ethernet card enabled can potentially use this flaw to e ...