Vulnerabilities > XEN > Medium

DATE CVE VULNERABILITY TITLE RISK
2014-12-01 CVE-2014-8867 Code vulnerability in multiple products
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
local
low complexity
redhat xen debian opensuse CWE-17
4.9
2014-12-01 CVE-2014-8866 Code vulnerability in multiple products
The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
4.7
2014-11-19 CVE-2014-8594 Improper Input Validation vulnerability in multiple products
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
network
high complexity
opensuse debian xen CWE-20
5.4
2014-10-26 CVE-2014-5148 Buffer Errors vulnerability in XEN 4.4.0/4.4.1
Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.
local
low complexity
xen CWE-119
4.6
2014-10-02 CVE-2014-7155 Permissions, Privileges, and Access Controls vulnerability in multiple products
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
5.8
2014-10-02 CVE-2014-7154 Race Condition vulnerability in multiple products
Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
6.1
2014-08-29 CVE-2014-5147 Permissions, Privileges, and Access Controls vulnerability in XEN 4.4.0
Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
high complexity
xen CWE-264
4.3
2014-08-22 CVE-2014-5149 Resource Management Errors vulnerability in multiple products
Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5146.
4.7
2014-08-22 CVE-2014-5146 Resource Management Errors vulnerability in multiple products
Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5149.
4.7
2014-06-05 CVE-2014-3968 Denial of Service vulnerability in Xen
The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x allows local guest HVM administrators to cause a denial of service (host crash) via a large number of crafted requests, which trigger an error messages to be logged.
low complexity
xen opensuse
5.5