Vulnerabilities > XEN > XEN > 3.4.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2013-05-13 | CVE-2013-1917 | Improper Input Validation vulnerability in XEN Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction. | 1.9 |
2013-04-12 | CVE-2013-1920 | Permissions, Privileges, and Access Controls vulnerability in XEN Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors. | 4.4 |
2012-12-13 | CVE-2012-6333 | Resource Management Errors vulnerability in XEN Multiple HVM control operations in Xen 3.4 through 4.2 allow local HVM guest OS administrators to cause a denial of service (physical CPU consumption) via a large input. | 4.7 |
2012-12-13 | CVE-2012-5515 | Local Denial of Service vulnerability in Xen 'extent_order' Values The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value. local xen | 4.7 |
2012-12-13 | CVE-2012-5514 | Local Denial of Service vulnerability in Xen The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors. local xen | 4.7 |
2012-12-13 | CVE-2012-5511 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in XEN Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image. | 4.7 |
2012-12-13 | CVE-2011-3131 | Resource Management Errors vulnerability in XEN Xen 4.1.1 and earlier allows local guest OS kernels with control of a PCI[E] device to cause a denial of service (CPU consumption and host hang) via many crafted DMA requests that are denied by the IOMMU, which triggers a livelock. | 4.6 |
2012-11-21 | CVE-2012-4537 | Configuration vulnerability in XEN Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability." | 2.1 |
2012-11-21 | CVE-2012-4535 | Resource Management Errors vulnerability in XEN Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline." | 1.9 |
2012-10-31 | CVE-2012-4544 | Improper Input Validation vulnerability in XEN The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk. | 2.1 |