SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen x86 Far Instruction Emulation Flaw Lets Local Users Gain Elevated Privileges or Deny Service on the Guest System
SecurityTracker Alert ID:  1031271
SecurityTracker URL:  http://securitytracker.com/id/1031271
CVE Reference:   CVE-2014-8595   (Links to External Site)
Date:  Nov 28 2014
Impact:   Denial of service via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.2.1 and later
Description:   A vulnerability was reported in Xen. A local user on a guest system can obtain elevated privileges on the target guest system. A local user on a guest system can cause denial of service conditions on the guest system.

The emulation of far branch instructions does not properly enforce access controls. A local user on an HVM guest may be able to obtain guest supervisor mode privileges or cause the guest to crash.

x86 systems are affected. ARM systems are not affected.

Jan Beulich of SUSE reported this vulnerability.

Impact:   A local user on an HVM guest system can obtain elevated privileges on the target guest system or cause denial of service conditions on the guest system.
Solution:   The vendor has issued a fix (xsa110-4.3-and-4.2.patch, xsa110-unstable.patch; XSA-110).
Vendor URL:  www.xen.org/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Dec 11 2014 (Citrix Issues Fix for Citrix XenServer) Xen x86 Far Instruction Emulation Flaw Lets Local Users Gain Elevated Privileges or Deny Service on the Guest System
Citrix has issued a fix for Citrix XenServer.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC