4.9
CVSSv2

CVE-2015-4164

Published: 15/06/2015 Updated: 30/10/2018
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The compat_iret function in Xen 3.1 up to and including 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 3.1.3

xen xen 3.1.4

xen xen 3.3.2

xen xen 3.4.0

xen xen 4.0.2

xen xen 4.0.3

xen xen 4.1.6.1

xen xen 4.2.0

xen xen 4.4.0

xen xen 3.2.2

xen xen 3.2.3

xen xen 3.4.3

xen xen 3.4.4

xen xen 4.1.1

xen xen 4.1.2

xen xen 4.2.3

xen xen 4.3.0

xen xen 3.2.0

xen xen 3.2.1

xen xen 3.4.1

xen xen 3.4.2

xen xen 4.0.4

xen xen 4.1.0

xen xen 4.2.1

xen xen 4.2.2

xen xen 4.4.1

xen xen 4.5.0

xen xen 3.3.0

xen xen 3.3.1

xen xen 4.0.0

xen xen 4.0.1

xen xen 4.1.3

xen xen 4.1.4

xen xen 4.1.5

xen xen 4.3.1

xen xen 4.3.4

Vendor Advisories

Debian Bug report logs - #795721 CVE-2015-3259 CVE-2015-3340 CVE-2015-4163 CVE-2015-4164 Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 16 Aug 2015 12:45:02 UTC Severity: important Tags: security Fixed i ...
Multiple security issues have been found in the Xen virtualisation solution: CVE-2015-3209 Matt Tait discovered a flaw in the way QEMU's AMD PCnet Ethernet emulation handles multi-TMD packets with a length above 4096 bytes A privileged guest user in a guest with an AMD PCNet ethernet card enabled can potentially use this flaw to e ...
The compat_iret function in Xen 31 through 45 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGSVM set ...