CVE-2015-2151

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.

References

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761

http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html

http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html

http://support.citrix.com/article/CTX200484

http://www.debian.org/security/2015/dsa-3181

http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

http://www.securityfocus.com/bid/73015

http://www.securitytracker.com/id/1031806

http://www.securitytracker.com/id/1031903

http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-423503.htm

http://xenbits.xen.org/xsa/advisory-123.html

https://security.gentoo.org/glsa/201604-03

Details

Source: MITRE

Published: 2015-03-12

Updated: 2018-10-30

Type: CWE-264

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*

Tenable Plugins

View all (24 total)

IDNameProductFamilySeverity
140019OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
111992OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
90380GLSA-201604-03 : Xen: Multiple vulnerabilities (Venom)NessusGentoo Local Security Checks
critical
89968CentOS 5 : kernel (CESA-2016:0450)NessusCentOS Local Security Checks
high
89957Scientific Linux Security Update : kernel on SL5.x i386/x86_64 (20160315)NessusScientific Linux Local Security Checks
high
89956RHEL 5 : kernel (RHSA-2016:0450)NessusRed Hat Local Security Checks
high
89953Oracle Linux 5 : kernel (ELSA-2016-0450)NessusOracle Linux Local Security Checks
high
84708FreeBSD : xen-kernel -- Hypervisor memory corruption due to x86 emulator flaw (83a28417-27e3-11e5-a4a5-002590263bf5)NessusFreeBSD Local Security Checks
high
84333openSUSE Security Update : xen (openSUSE-2015-434) (Venom)NessusSuSE Local Security Checks
high
84140OracleVM 3.2 : xen (OVMSA-2015-0068) (POODLE) (Venom)NessusOracleVM Local Security Checks
low
83720SUSE SLED11 / SLES11 Security Update : Xen (SUSE-SU-2015:0747-1)NessusSuSE Local Security Checks
high
83719SUSE SLES11 Security Update : Xen (SUSE-SU-2015:0746-1)NessusSuSE Local Security Checks
high
83718SUSE SLES11 Security Update : Xen (SUSE-SU-2015:0745-1)NessusSuSE Local Security Checks
high
83717SUSE SLES10 Security Update : Xen (SUSE-SU-2015:0744-1)NessusSuSE Local Security Checks
high
83707SUSE SLED12 / SLES12 Security Update : Xen (SUSE-SU-2015:0613-1)NessusSuSE Local Security Checks
high
82990SuSE 11.3 Security Update : Xen (SAT Patch Number 10560)NessusSuSE Local Security Checks
high
82907openSUSE Security Update : xen (openSUSE-2015-314)NessusSuSE Local Security Checks
high
82054Fedora 21 : xen-4.4.1-16.fc21 (2015-3944)NessusFedora Local Security Checks
high
82051Fedora 20 : xen-4.3.3-12.fc20 (2015-3721)NessusFedora Local Security Checks
high
81987Fedora 22 : xen-4.5.0-6.fc22 (2015-3935)NessusFedora Local Security Checks
high
81874OracleVM 2.2 : xen (OVMSA-2015-0035)NessusOracleVM Local Security Checks
high
81768OracleVM 3.2 : xen (OVMSA-2015-0032)NessusOracleVM Local Security Checks
high
81767OracleVM 3.3 : xen (OVMSA-2015-0031)NessusOracleVM Local Security Checks
high
81748Debian DSA-3181-1 : xen - security updateNessusDebian Local Security Checks
high