SB2013110203 - Multiple vulnerabilities in Xen 



SB2013110203 - Multiple vulnerabilities in Xen

Published: November 2, 2013 Updated: August 10, 2020

Security Bulletin ID SB2013110203
Severity
High
Patch available
NO
Number of vulnerabilities 10
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

High 10% Medium 40% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2014-1891)

The vulnerability allows a remote #AU# to perform a denial of service (DoS) attack.

Multiple integer overflows in the (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER, and (4) FLASK_CONTEXT_TO_SID suboperations in the flask hypercall in Xen 4.3.x, 4.2.x, 4.1.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1892, CVE-2014-1893, and CVE-2014-1894.


2) Input validation error (CVE-ID: CVE-2014-1895)

The vulnerability allows a remote #AU# to #BASIC_IMPACT#.

Off-by-one error in the flask_security_avc_cachestats function in xsm/flask/flask_op.c in Xen 4.2.x and 4.3.x, when the maximum number of physical CPUs are in use, allows local users to cause a denial of service (host crash) or obtain sensitive information from hypervisor memory by leveraging a FLASK_AVC_CACHESTAT hypercall, which triggers a buffer over-read.


3) Use-after-free (CVE-ID: CVE-2014-1950)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing unspecified vectors. A local users with access to management functions can cause a denial of service (heap corruption) and possibly gain privileges.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


4) Use-after-free (CVE-ID: CVE-2014-1642)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free. A local guest administrators can cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2014-1666)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The do_physdev_op function in Xen 4.1.5, 4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict access to the (1) PHYSDEVOP_prepare_msix and (2) PHYSDEVOP_release_msix operations, which allows local PV guests to cause a denial of service (host or guest malfunction) or possibly gain privileges via unspecified vectors.


6) Buffer overflow (CVE-ID: CVE-2013-4553)

The vulnerability allows a remote #AU# to perform a denial of service (DoS) attack.

The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).


7) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-4554)

The vulnerability allows a remote #AU# to read and manipulate data.

Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.


8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-6400)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Xen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows local guest administrators to cause a denial of service (host crash) or gain privileges via unspecified vectors.


9) Input validation error (CVE-ID: CVE-2013-4551)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."


10) Buffer overflow (CVE-ID: CVE-2013-4416)

The vulnerability allows a remote #AU# to perform a denial of service (DoS) attack.

The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.

References