Input validation error - CVE-2015-8552

 

Input validation error - CVE-2015-8552

Published: April 13, 2016 / Updated: August 4, 2020


Vulnerability identifier: #VU33637
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-8552
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor:
Affected software:

Detailed vulnerability description

The vulnerability allows a local privileged user to perform a denial of service (DoS) attack.

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."


How to mitigate CVE-2015-8552

Install update from vendor's website.

Sources