Vulnerabilities > XEN

DATE CVE VULNERABILITY TITLE RISK
2014-01-07 CVE-2011-1936 Denial-Of-Service vulnerability in Xen
Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
high complexity
xen
4.6
2014-01-07 CVE-2011-1780 Improper Input Validation vulnerability in XEN 3.0.3
The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread.
low complexity
xen CWE-20
6.1
2014-01-07 CVE-2011-1763 Unspecified vulnerability in XEN
The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.
low complexity
xen
7.7
2014-01-07 CVE-2011-1166 Improper Input Validation vulnerability in XEN
Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.
low complexity
xen CWE-20
5.5
2013-12-27 CVE-2011-2519 Null Pointer Dereference vulnerability in multiple products
Xen in the Linux kernel, when running a guest on a host without hardware assisted paging (HAP), allows guest users to cause a denial of service (invalid pointer dereference and hypervisor crash) via the SAHF instruction.
low complexity
xen redhat CWE-476
5.5
2013-12-24 CVE-2013-4554 Permissions, Privileges, and Access Controls vulnerability in XEN
Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
low complexity
xen CWE-264
5.2
2013-12-24 CVE-2013-4553 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in XEN
The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).
5.2
2013-12-13 CVE-2013-6400 Permissions, Privileges, and Access Controls vulnerability in XEN
Xen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows local guest administrators to cause a denial of service (host crash) or gain privileges via unspecified vectors.
high complexity
xen CWE-264
6.8
2013-11-23 CVE-2013-6375 Permissions, Privileges, and Access Controls vulnerability in multiple products
Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter."
7.9
2013-11-18 CVE-2013-4551 Improper Input Validation vulnerability in XEN
Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
5.7