Vulnerability CVE-2011-1898


Published: 2011-08-12   Modified: 2012-02-13

Description:
Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:A/AC:M/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.4/10
10/10
4.4/10
Exploit range
Attack complexity
Authentication
Adjacent network
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Citrix -> XEN 

 References:
http://xen.org/download/index_4.0.2.html
http://xen.1045712.n5.nabble.com/Xen-security-advisory-CVE-2011-1898-VT-d-PCI-passthrough-MSI-td4390298.html
http://www.invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdf
http://theinvisiblethings.blogspot.com/2011/05/following-white-rabbit-software-attacks.html
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00017.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062139.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062112.html

Copyright 2022, cxsecurity.com

 

Back to Top