ID |
CVE-2012-5634
|
Summary |
Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
|
CVSS |
Base: | 6.1 (as of 19-04-2014 - 04:28) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-16 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
ADJACENT_NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
COMPLETE |
|
cvss-vector
via4
|
AV:A/AC:L/Au:N/C:N/I:N/A:C
|
refmap
via4
|
debian | DSA-2636 | gentoo | GLSA-201309-24 | mlist | [oss-security] 20130109 Xen Security Advisory 33 (CVE-2012-5634) - VT-d interrupt remapping source validation flaw | secunia | 55082 | suse | - SUSE-SU-2014:0446
- openSUSE-SU-2013:0636
- openSUSE-SU-2013:0637
- openSUSE-SU-2013:0912
|
|
Last major update |
19-04-2014 - 04:28 |
Published |
14-02-2013 - 22:55 |
Last modified |
19-04-2014 - 04:28 |