Vulnerabilities > XEN > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-01-19 | CVE-2013-4375 | Resource Management Errors vulnerability in multiple products The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors. | 2.7 |
2013-10-17 | CVE-2013-4368 | Information Exposure vulnerability in XEN The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register. | 1.9 |
2013-10-17 | CVE-2013-4369 | NULL pointer Dereference Remote Denial of Service vulnerability in Xen The xlu_vif_parse_rate function in the libxlu library in Xen 4.2.x and 4.3.x allows local users to cause a denial of service (NULL pointer dereference) by using the "@" character as the VIF rate configuration. local xen | 1.9 |
2013-10-01 | CVE-2013-4361 | Information Exposure vulnerability in XEN The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction. | 2.1 |
2013-09-30 | CVE-2013-1442 | Information Exposure vulnerability in XEN Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers. | 1.2 |
2013-05-13 | CVE-2013-1917 | Improper Input Validation vulnerability in XEN Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction. | 1.9 |
2013-05-13 | CVE-2013-1922 | Permissions, Privileges, and Access Controls vulnerability in XEN 4.2.0/4.2.1/4.2.2 qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004. | 3.3 |
2013-05-13 | CVE-2013-1952 | Improper Input Validation vulnerability in XEN Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors. | 1.9 |
2013-01-12 | CVE-2013-0154 | Local Denial Of Service vulnerability in XEN 4.2.0 The get_page_type function in xen/arch/x86/mm.c in Xen 4.2, when debugging is enabled, allows local PV or HVM guest administrators to cause a denial of service (assertion failure and hypervisor crash) via unspecified vectors related to a hypercall. local xen | 1.9 |
2012-12-03 | CVE-2012-0218 | Unspecified vulnerability in XEN 3.4.0/4.0.0/4.1.0 Xen 3.4, 4.0, and 4.1, when the guest OS has not registered a handler for a syscall or sysenter instruction, does not properly clear a flag for exception injection when injecting a General Protection Fault, which allows local PV guest OS users to cause a denial of service (guest crash) by later triggering an exception that would normally be handled within Xen. local xen | 1.9 |