Insufficient verification of data authenticity in Xen



Published: 2020-10-22 | Updated: 2021-01-24
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-27670
CWE-ID CWE-345
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Xen
Server applications / Virtualization software

Vendor Xen Project

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Insufficient verification of data authenticity

EUVDB-ID: #VU49940

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-27670

CWE-ID: CWE-345 - Insufficient Verification of Data Authenticity

Exploit availability: No

Description

The vulnerability allows a local authenticated user to execute arbitrary code.

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Xen: 4.0.0 - 4.14.1


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html
http://www.openwall.com/lists/oss-security/2021/01/19/9
http://xenbits.xen.org/xsa/advisory-347.html
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XIK57QJOVOPWH6RFRNMGOBCROBCKMDG2/
http://security.gentoo.org/glsa/202011-06
http://www.debian.org/security/2020/dsa-4804
http://xenbits.xen.org/xsa/advisory-347.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###