CVE-2013-0154
Gentoo Linux Security Advisory 201309-24
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The get_page_type function in xen/arch/x86/mm.c in Xen 4.2, when debugging is enabled, allows local PV or HVM guest administrators to cause a denial of service (assertion failure and hypervisor crash) via unspecified vectors related to a hypercall.
La función get_page_type en xen/arch/x86/mm.c en Xen v4.2, cuando esté habilitada la depuración, permite a PV locales o administradores huésped en HVM provocar una denegación de servicios (error de aserción y caída del hipervisor) a través de vectores relacionados con "hypercall".
Multiple vulnerabilities have been found in Xen, allowing attackers on a Xen Virtual Machine to execute arbitrary code, cause Denial of Service, or gain access to data on the host. Versions less than 4.2.2-r1 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-12-06 CVE Reserved
- 2013-01-12 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://osvdb.org/88913 | Vdb Entry | |
http://seclists.org/oss-sec/2013/q1/att-17/xsa37-4_2.patch | X_refsource_confirm |
|
http://secunia.com/advisories/55082 | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2013/01/04/2 | Mailing List |
|
http://www.securityfocus.com/bid/57159 | Vdb Entry | |
http://www.securitytracker.com/id?1027937 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/80977 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|