Permissions, Privileges, and Access Controls in Xen - CVE-2015-4103
Published: June 3, 2015 / Updated: August 9, 2020
Xen
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
How to mitigate CVE-2015-4103
Sources
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160154.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160171.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html
- http://support.citrix.com/article/CTX201145
- http://www.debian.org/security/2015/dsa-3284
- http://www.debian.org/security/2015/dsa-3286
- http://www.securityfocus.com/bid/74947
- http://www.securitytracker.com/id/1032456
- http://www.ubuntu.com/usn/USN-2630-1
- http://xenbits.xen.org/xsa/advisory-128.html
- https://security.gentoo.org/glsa/201604-03
- https://support.citrix.com/article/CTX206006