Vulnerabilities > XEN > XEN > 4.2.3

DATE CVE VULNERABILITY TITLE RISK
2013-10-17 CVE-2013-4368 Information Exposure vulnerability in XEN
The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.
local
xen CWE-200
1.9
2013-09-30 CVE-2013-1442 Information Exposure vulnerability in XEN
Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
local
high complexity
xen CWE-200
1.2
2013-09-12 CVE-2013-4329 Permissions, Privileges, and Access Controls vulnerability in XEN
The xenlight library (libxl) in Xen 4.0.x through 4.2.x, when IOMMU is disabled, provides access to a busmastering-capable PCI passthrough device before the IOMMU setup is complete, which allows local HVM guest domains to gain privileges or cause a denial of service via a DMA instruction.
high complexity
xen CWE-264
6.5