Permissions, Privileges, and Access Controls in Xen - CVE-2013-6400

 

Permissions, Privileges, and Access Controls in Xen - CVE-2013-6400

Published: December 13, 2013 / Updated: August 10, 2020


Vulnerability identifier: #VU42234
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2013-6400
CWE-ID: CWE-264
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Xen Project
Affected software:
Xen

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Xen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows local guest administrators to cause a denial of service (host crash) or gain privileges via unspecified vectors.


How to mitigate CVE-2013-6400

Install update from vendor's website.

Sources