587
VMScore

CVE-2015-8554

Published: 14/04/2016 Updated: 01/07/2017
CVSS v2 Base Score: 6.6 | Impact Score: 10 | Exploitability Score: 2.7
CVSS v3 Base Score: 7.5 | Impact Score: 6 | Exploitability Score: 0.8
VMScore: 587
Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and previous versions, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen

Vendor Advisories

Buffer overflow in hw/pt-msic in Xen 46x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path" ...