Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-7188

Опубликовано: 01 окт. 2014
Источник: redhat
CVSS2: 5.8
EPSS Низкий

Описание

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.

Отчет

Not vulnerable. This issue does not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernel-xenNot affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1144499kernel: xen: Improper MSR range used for x2APIC emulation (xsa108)

EPSS

Процентиль: 85%
0.02548
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.

nvd
больше 11 лет назад

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.

debian
больше 11 лет назад

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 t ...

github
больше 3 лет назад

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.

EPSS

Процентиль: 85%
0.02548
Низкий

5.8 Medium

CVSS2