[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2019-18420Date: (C)2019-11-04   (M)2024-04-19


An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 6.5CVSS Score : 6.3
Exploit Score: 2.8Exploit Score: 6.8
Impact Score: 3.6Impact Score: 6.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: SINGLE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: COMPLETE
Integrity: NONE 
Availability: HIGH 
  
Reference:
https://seclists.org/bugtraq/2020/Jan/21
DSA-4602
FEDORA-2019-376ec5c107
FEDORA-2019-865bb16900
FEDORA-2019-cbb732f760
GLSA-202003-56
http://www.openwall.com/lists/oss-security/2019/10/31/1
http://xenbits.xen.org/xsa/advisory-296.html
openSUSE-SU-2019:2506

CPE    1
cpe:/o:debian:debian_linux:9.0
CWE    1
CWE-134
OVAL    10
oval:org.secpod.oval:def:89003200
oval:org.secpod.oval:def:89050660
oval:org.secpod.oval:def:89003283
oval:org.secpod.oval:def:89050576
...

© SecPod Technologies