Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-8867


The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.


Published

2014-12-01T15:59:09.780

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 4.9 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:N/I:N/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-17

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System redhat enterprise_linux 5.0 Yes
Operating System redhat enterprise_linux_desktop 5.0 Yes
Operating System xen xen ≤ 3.2.0 Yes
Operating System xen xen 3.2.1 Yes
Operating System xen xen 3.2.2 Yes
Operating System xen xen 3.2.3 Yes
Operating System xen xen 4.4.0 Yes
Operating System xen xen 4.4.1 Yes
Operating System debian debian_linux 7.0 Yes
Operating System opensuse opensuse 13.1 Yes
Operating System opensuse opensuse 13.2 Yes

References