Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1917

Опубликовано: 13 мая 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 1.9

Описание

Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.

РелизСтатусПримечание
devel

released

4.2.1-0ubuntu3.1
hardy

DNE

lucid

DNE

oneiric

ignored

end of life
precise

released

4.1.2-2ubuntu2.8
quantal

released

4.1.3-3ubuntu1.5
raring

released

4.2.1-0ubuntu3.1
saucy

released

4.2.1-0ubuntu3.1
upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needed

Показывать по

EPSS

Процентиль: 22%
0.00074
Низкий

1.9 Low

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.

nvd
больше 12 лет назад

Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.

debian
больше 12 лет назад

Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not ...

github
больше 3 лет назад

Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.

EPSS

Процентиль: 22%
0.00074
Низкий

1.9 Low

CVSS2

Уязвимость CVE-2013-1917