Show filters
85 Total Results
Displaying 51-60 of 85
Sort by:
Attacker Value
Unknown
CVE-2013-4553
Disclosure Date: December 24, 2013 (last updated October 05, 2023)
The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).
0
Attacker Value
Unknown
CVE-2013-4554
Disclosure Date: December 24, 2013 (last updated October 05, 2023)
Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
0
Attacker Value
Unknown
CVE-2013-6400
Disclosure Date: December 13, 2013 (last updated October 05, 2023)
Xen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows local guest administrators to cause a denial of service (host crash) or gain privileges via unspecified vectors.
0
Attacker Value
Unknown
CVE-2013-6375
Disclosure Date: November 23, 2013 (last updated October 05, 2023)
Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter."
0
Attacker Value
Unknown
CVE-2013-4551
Disclosure Date: November 18, 2013 (last updated October 05, 2023)
Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
0
Attacker Value
Unknown
CVE-2013-4416
Disclosure Date: November 02, 2013 (last updated October 05, 2023)
The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
0
Attacker Value
Unknown
CVE-2013-4369
Disclosure Date: October 17, 2013 (last updated October 05, 2023)
The xlu_vif_parse_rate function in the libxlu library in Xen 4.2.x and 4.3.x allows local users to cause a denial of service (NULL pointer dereference) by using the "@" character as the VIF rate configuration.
0
Attacker Value
Unknown
CVE-2013-4370
Disclosure Date: October 17, 2013 (last updated October 05, 2023)
The ocaml binding for the xc_vcpu_getaffinity function in Xen 4.2.x and 4.3.x frees certain memory that may still be intended for use, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors that trigger a (1) use-after-free or (2) double free.
0
Attacker Value
Unknown
CVE-2013-4368
Disclosure Date: October 17, 2013 (last updated October 05, 2023)
The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.
0
Attacker Value
Unknown
CVE-2013-4371
Disclosure Date: October 17, 2013 (last updated October 05, 2023)
Use-after-free vulnerability in the libxl_list_cpupool function in the libxl toolstack library in Xen 4.2.x and 4.3.x, when running "under memory pressure," returns the original pointer when the realloc function fails, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors.
0