4.4

CVE-2015-8552

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
XenXen Version3.1.3
XenXen Version3.1.4
XenXen Version3.2.0
XenXen Version3.2.1
XenXen Version3.2.2
XenXen Version3.2.3
XenXen Version3.3.0
XenXen Version3.3.1
XenXen Version3.3.2
XenXen Version3.4.0
XenXen Version3.4.1
XenXen Version3.4.2
XenXen Version3.4.3
XenXen Version3.4.4
XenXen Version4.0.0
XenXen Version4.0.1
XenXen Version4.0.2
XenXen Version4.0.3
XenXen Version4.0.4
XenXen Version4.1.0
XenXen Version4.1.1
XenXen Version4.1.2
XenXen Version4.1.3
XenXen Version4.1.4
XenXen Version4.1.5
XenXen Version4.1.6
XenXen Version4.1.6.1
XenXen Version4.2.0
XenXen Version4.2.1
XenXen Version4.2.2
XenXen Version4.2.3
XenXen Version4.2.4
XenXen Version4.2.5
XenXen Version4.3.0
XenXen Version4.3.1
XenXen Version4.3.2
XenXen Version4.3.3
XenXen Version4.3.4
CanonicalUbuntu Linux Version12.04 SwEditionlts
DebianDebian Linux Version6.0
NovellSuse Linux Enterprise Debuginfo Version11 Updatesp4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.16% 0.38
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.4 0.8 3.6
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 1.7 3.1 2.9
AV:L/AC:L/Au:S/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.