Vulnerabilities > XEN > XEN > 4.0.1

DATE CVE VULNERABILITY TITLE RISK
2014-04-01 CVE-2014-1891 Numeric Errors vulnerability in XEN
Multiple integer overflows in the (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER, and (4) FLASK_CONTEXT_TO_SID suboperations in the flask hypercall in Xen 4.3.x, 4.2.x, 4.1.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1892, CVE-2014-1893, and CVE-2014-1894.
5.2
2014-01-07 CVE-2011-1166 Improper Input Validation vulnerability in XEN
Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.
low complexity
xen CWE-20
5.5
2013-12-24 CVE-2013-4554 Permissions, Privileges, and Access Controls vulnerability in XEN
Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
low complexity
xen CWE-264
5.2
2013-12-24 CVE-2013-4553 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in XEN
The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).
5.2
2013-10-17 CVE-2013-4368 Information Exposure vulnerability in XEN
The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.
local
xen CWE-200
1.9
2013-10-01 CVE-2013-4361 Information Exposure vulnerability in XEN
The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
local
low complexity
xen CWE-200
2.1
2013-09-30 CVE-2013-1442 Information Exposure vulnerability in XEN
Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
local
high complexity
xen CWE-200
1.2
2013-09-12 CVE-2013-4329 Permissions, Privileges, and Access Controls vulnerability in XEN
The xenlight library (libxl) in Xen 4.0.x through 4.2.x, when IOMMU is disabled, provides access to a busmastering-capable PCI passthrough device before the IOMMU setup is complete, which allows local HVM guest domains to gain privileges or cause a denial of service via a DMA instruction.
high complexity
xen CWE-264
6.5
2013-08-28 CVE-2013-3495 Permissions, Privileges, and Access Controls vulnerability in multiple products
The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
4.7
2013-08-28 CVE-2013-2212 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in XEN
The vmx_set_uc_mode function in Xen 3.3 through 4.3, when disabling caches, allows local HVM guests with access to memory mapped I/O regions to cause a denial of service (CPU consumption and possibly hypervisor or guest kernel panic) via a crafted GFN range.
5.7