CVE-2015-8551

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."

References

http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html

http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html

http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html

http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html

http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html

http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html

http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html

http://www.debian.org/security/2016/dsa-3434

http://www.securityfocus.com/bid/79546

http://www.securitytracker.com/id/1034480

http://xenbits.xen.org/xsa/advisory-157.html

https://security.gentoo.org/glsa/201604-03

Details

Source: MITRE

Published: 2016-04-13

Updated: 2020-08-26

Type: CWE-476

Risk Information

CVSS v2

Base Score: 4.7

Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.4

Severity: MEDIUM

CVSS v3

Base Score: 6

Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

Impact Score: 4

Exploitability Score: 1.5

Severity: MEDIUM

Tenable Plugins

View all (20 total)

IDNameProductFamilySeverity
93299SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:2105-1)NessusSuSE Local Security Checks
high
93216openSUSE Security Update : the Linux Kernel (openSUSE-2016-1029)NessusSuSE Local Security Checks
high
90884SUSE SLES11 Security Update : kernel (SUSE-SU-2016:1203-1)NessusSuSE Local Security Checks
critical
90783openSUSE Security Update : the Linux Kernel (openSUSE-2016-518)NessusSuSE Local Security Checks
critical
90380GLSA-201604-03 : Xen: Multiple vulnerabilities (Venom)NessusGentoo Local Security Checks
critical
90264SUSE SLED11 / SLES11 Security Update : kernel (SUSE-SU-2016:0911-1)NessusSuSE Local Security Checks
critical
89022SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:0585-1)NessusSuSE Local Security Checks
high
88605openSUSE Security Update : the Linux Kernel (openSUSE-2016-136)NessusSuSE Local Security Checks
high
88545openSUSE Security Update : the Linux Kernel (openSUSE-2016-124)NessusSuSE Local Security Checks
high
88542openSUSE Security Update : the Linux Kernel (openSUSE-2016-116)NessusSuSE Local Security Checks
high
88006SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:0168-1)NessusSuSE Local Security Checks
high
87741Debian DSA-3434-1 : linux - security updateNessusDebian Local Security Checks
high
87537Ubuntu 14.04 LTS : linux-lts-vivid vulnerabilities (USN-2854-1)NessusUbuntu Local Security Checks
high
87536Ubuntu 14.04 LTS : linux-lts-wily vulnerabilities (USN-2853-1)NessusUbuntu Local Security Checks
high
87534Ubuntu 15.10 : linux vulnerabilities (USN-2851-1)NessusUbuntu Local Security Checks
high
87533Ubuntu 15.04 : linux vulnerabilities (USN-2850-1)NessusUbuntu Local Security Checks
high
87532Ubuntu 14.04 LTS : linux-lts-utopic vulnerabilities (USN-2849-1)NessusUbuntu Local Security Checks
high
87531Ubuntu 14.04 LTS : linux vulnerabilities (USN-2848-1)NessusUbuntu Local Security Checks
high
87530Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-2847-1)NessusUbuntu Local Security Checks
high
87529Ubuntu 12.04 LTS : linux vulnerabilities (USN-2846-1)NessusUbuntu Local Security Checks
high