CVE-2015-8554
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."
Desbordamiento de buffer en hw/pt-msi.c en Xen 4.6.x y versiones anteriores, cuando se utiliza el modelo de dispositivo qemu-xen-traditional (también conocido como qemu-dm), permite a administradores locales x86 HVM invitados obtener privilegios aprovechando un sistema con acceso a un dispositivo PCI físico con capacidad de paso a través de MSI-X y a entradas de tabla MSI-X, relacionado con una "ruta de escritura".
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-14 CVE Reserved
- 2016-04-14 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/79579 | Vdb Entry | |
http://www.securitytracker.com/id/1034481 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://support.citrix.com/article/CTX203879 | 2017-07-01 | |
http://xenbits.xen.org/xsa/advisory-164.html | 2017-07-01 | |
https://security.gentoo.org/glsa/201604-03 | 2017-07-01 |