Vulnerability Details : CVE-2014-5147
Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-5147
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 10 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-5147
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:A/AC:H/Au:S/C:N/I:N/A:C |
2.5
|
6.9
|
NIST |
CWE ids for CVE-2014-5147
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5147
-
http://xenbits.xen.org/xsa/advisory-102.html
XSA-102 - Xen Security AdvisoriesPatch;Vendor Advisory
-
http://www.securitytracker.com/id/1030724
Xen Trap Handling Flaw Lets Local Guest System Users Deny Service on the Host System - SecurityTracker
Products affected by CVE-2014-5147
- cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*