Permissions, Privileges, and Access Controls in Xen - CVE-2014-7155

 

Permissions, Privileges, and Access Controls in Xen - CVE-2014-7155

Published: October 2, 2014 / Updated: July 28, 2020


Vulnerability identifier: #VU32480
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2014-7155
CWE-ID: CWE-264
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
Xen
Software vendor:
Xen Project

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.


Remediation

Install update from vendor's website.

External links