Unknown
CVE-2015-8551
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2015-8551
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCIOP* operations, aka “Linux pciback missing sanity checks.”
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- debian,
- linux,
- opensuse,
- suse
Products
- debian linux 7.0,
- debian linux 8.0,
- linux enterprise desktop 11,
- linux enterprise desktop 12,
- linux enterprise real time extension 11,
- linux enterprise real time extension 12,
- linux enterprise server 11,
- linux enterprise server 12,
- linux enterprise software development kit 11,
- linux enterprise software development kit 12,
- linux enterprise workstation extension 12,
- linux kernel,
- opensuse 13.1
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: