Permissions, Privileges, and Access Controls in Xen - CVE-2011-1898
Published: August 12, 2011 / Updated: August 11, 2020
Xen
Detailed vulnerability description
The vulnerability allows a remote #AU# to execute arbitrary code.
Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
How to mitigate CVE-2011-1898
Sources
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062112.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062139.html
- http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00018.html
- http://theinvisiblethings.blogspot.com/2011/05/following-white-rabbit-software-attacks.html
- http://www.invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdf
- http://xen.1045712.n5.nabble.com/Xen-security-advisory-CVE-2011-1898-VT-d-PCI-passthrough-MSI-td4390298.html
- http://xen.org/download/index_4.0.2.html