Vulnerability Details : CVE-2018-19961
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
Exploit prediction scoring system (EPSS) score for CVE-2018-19961
Probability of exploitation activity in the next 30 days: 0.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 25 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-19961
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
1.1
|
6.0
|
NIST |
CWE ids for CVE-2018-19961
-
The product does not properly "clean up" and remove temporary or supporting resources after they have been used.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-19961
-
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html
[security-announce] openSUSE-SU-2019:1226-1: important: Security update
-
https://xenbits.xen.org/xsa/advisory-275.html
XSA-275 - Xen Security AdvisoriesPatch;Vendor Advisory
-
https://www.debian.org/security/2019/dsa-4369
Debian -- Security Information -- DSA-4369-1 xenThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXC6BME7SXJI2ZIATNXCAH7RGPI4UKTT/
[SECURITY] Fedora 28 Update: xen-4.10.3-2.fc28 - package-announce - Fedora Mailing-Lists
-
http://www.securityfocus.com/bid/106182
Xen Multiple Privilege Escalation and Denial of Service VulnerabilitiesThird Party Advisory;VDB Entry
-
https://lists.debian.org/debian-lts-announce/2019/10/msg00008.html
[SECURITY] [DLA 1949-1] xen security update
-
https://support.citrix.com/article/CTX239432
Citrix XenServer Security UpdateThird Party Advisory
Products affected by CVE-2018-19961
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xenserver:7.5:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xenserver:7.6:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xenserver:7.1:cu1:*:*:ltsr:*:*:*
- cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*