Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-8554

Опубликовано: 14 апр. 2016
Источник: nvd
CVSS3: 7.5
CVSS2: 6.6
EPSS Низкий

Описание

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
Версия до 4.6.1 (включая)

EPSS

Процентиль: 19%
0.00061
Низкий

7.5 High

CVSS3

6.6 Medium

CVSS2

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 10 лет назад

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."

redhat
около 10 лет назад

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."

CVSS3: 7.5
debian
почти 10 лет назад

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using th ...

CVSS3: 7.5
github
больше 3 лет назад

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."

suse-cvrf
около 10 лет назад

Security update for xen

EPSS

Процентиль: 19%
0.00061
Низкий

7.5 High

CVSS3

6.6 Medium

CVSS2

Дефекты

CWE-119