CVE-2015-8338

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Xen 4.6.x and earlier does not properly enforce limits on page order inputs for the (1) XENMEM_increase_reservation, (2) XENMEM_populate_physmap, (3) XENMEM_exchange, and possibly other HYPERVISOR_memory_op suboperations, which allows ARM guest OS administrators to cause a denial of service (CPU consumption, guest reboot, or watchdog timeout and host reboot) and possibly have unspecified other impact via unknown vectors.

References

http://www.debian.org/security/2016/dsa-3633

http://www.securityfocus.com/bid/78920

http://www.securitytracker.com/id/1034390

http://xenbits.xen.org/xsa/advisory-158.html

Details

Source: MITRE

Published: 2015-12-17

Updated: 2016-12-07

Type: CWE-254

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* versions up to 4.6.0 (inclusive)

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
92614Debian DSA-3633-1 : xen - security update (Bunker Buster)NessusDebian Local Security Checks
high
89151Fedora 23 : xen-4.5.2-5.fc23 (2015-12a089920e)NessusFedora Local Security Checks
critical
89135Fedora 22 : xen-4.5.2-5.fc22 (2015-08e4af5a20)NessusFedora Local Security Checks
critical