Vulnerability Details : CVE-2015-2752
The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).
Vulnerability category: Denial of service
Products affected by CVE-2015-2752
- cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-2752
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-2752
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST |
CWE ids for CVE-2015-2752
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-2752
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154574.html
[SECURITY] Fedora 21 Update: xen-4.4.2-2.fc21Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html
[security-announce] SUSE-SU-2015:0923-1: important: Security update for
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154579.html
[SECURITY] Fedora 20 Update: xen-4.3.4-2.fc20Third Party Advisory
-
http://www.securitytracker.com/id/1031994
Xen XEN_DOMCTL_memory_mapping Missing Preemption Bug Lets Local Guest Users Deny Service on the Host System - SecurityTrackerThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html
[security-announce] openSUSE-SU-2015:0732-1: important: Security update
-
http://xenbits.xen.org/xsa/advisory-125.html
XSA-125 - Xen Security AdvisoriesPatch;Vendor Advisory
-
https://security.gentoo.org/glsa/201504-04
Xen: Multiple vulnerabilities (GLSA 201504-04) — Gentoo security
-
http://www.securityfocus.com/bid/73448
Xen CVE-2015-2752 Denial of Service Vulnerability
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155198.html
[SECURITY] Fedora 22 Update: xen-4.5.0-7.fc22
Jump to