// For flags

CVE-2013-4368

xen: information leak through outs instruction emulation (XSA-67)

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.

La instrucción de emulación outs en Xen 3.1.x, 4.2.x, 4.3.x, y anteriores versiones, cuando se usa la anulación del segmento FS: o GS:, utiliza una variable sin inicializar como segmento base, lo que permite a usuarios locales de 64-bit PV obtener información sensible (contenido de la pila de hipervisor) a través de vectores relacionados de datos obsoletos en un registro del segmento.

The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel handled the creation of temporary IPv6 addresses. If the IPv6 privacy extension was enabled, an attacker on the local network could disable IPv6 temporary address generation, leading to a potential information disclosure. An information leak flaw was found in the way Linux kernel's device mapper subsystem, under certain conditions, interpreted data written to snapshot block devices. An attacker could use this flaw to read data from disk blocks in free space, which are normally inaccessible.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-06-12 CVE Reserved
  • 2013-10-17 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
<= 4.3.0
Search vendor "Xen" for product "Xen" and version " <= 4.3.0"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.0.2
Search vendor "Xen" for product "Xen" and version "3.0.2"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.0.3
Search vendor "Xen" for product "Xen" and version "3.0.3"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.0.4
Search vendor "Xen" for product "Xen" and version "3.0.4"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.1.3
Search vendor "Xen" for product "Xen" and version "3.1.3"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.1.4
Search vendor "Xen" for product "Xen" and version "3.1.4"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.2.0
Search vendor "Xen" for product "Xen" and version "3.2.0"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.2.1
Search vendor "Xen" for product "Xen" and version "3.2.1"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.2.2
Search vendor "Xen" for product "Xen" and version "3.2.2"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.2.3
Search vendor "Xen" for product "Xen" and version "3.2.3"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.3.0
Search vendor "Xen" for product "Xen" and version "3.3.0"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.3.1
Search vendor "Xen" for product "Xen" and version "3.3.1"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.3.2
Search vendor "Xen" for product "Xen" and version "3.3.2"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.4.0
Search vendor "Xen" for product "Xen" and version "3.4.0"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.4.1
Search vendor "Xen" for product "Xen" and version "3.4.1"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.4.2
Search vendor "Xen" for product "Xen" and version "3.4.2"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.4.3
Search vendor "Xen" for product "Xen" and version "3.4.3"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
3.4.4
Search vendor "Xen" for product "Xen" and version "3.4.4"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.0.0
Search vendor "Xen" for product "Xen" and version "4.0.0"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.0.1
Search vendor "Xen" for product "Xen" and version "4.0.1"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.0.2
Search vendor "Xen" for product "Xen" and version "4.0.2"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.0.3
Search vendor "Xen" for product "Xen" and version "4.0.3"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.0.4
Search vendor "Xen" for product "Xen" and version "4.0.4"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.1.0
Search vendor "Xen" for product "Xen" and version "4.1.0"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.1.1
Search vendor "Xen" for product "Xen" and version "4.1.1"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.1.2
Search vendor "Xen" for product "Xen" and version "4.1.2"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.1.3
Search vendor "Xen" for product "Xen" and version "4.1.3"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.1.4
Search vendor "Xen" for product "Xen" and version "4.1.4"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.1.5
Search vendor "Xen" for product "Xen" and version "4.1.5"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.1.6.1
Search vendor "Xen" for product "Xen" and version "4.1.6.1"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.2.0
Search vendor "Xen" for product "Xen" and version "4.2.0"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.2.1
Search vendor "Xen" for product "Xen" and version "4.2.1"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.2.2
Search vendor "Xen" for product "Xen" and version "4.2.2"
-
Affected
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
4.2.3
Search vendor "Xen" for product "Xen" and version "4.2.3"
-
Affected