4.4

CVE-2015-8552

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."

Data is provided by the National Vulnerability Database (NVD)
XenXen Version3.1.3
XenXen Version3.1.4
XenXen Version3.2.0
XenXen Version3.2.1
XenXen Version3.2.2
XenXen Version3.2.3
XenXen Version3.3.0
XenXen Version3.3.1
XenXen Version3.3.2
XenXen Version3.4.0
XenXen Version3.4.1
XenXen Version3.4.2
XenXen Version3.4.3
XenXen Version3.4.4
XenXen Version4.0.0
XenXen Version4.0.1
XenXen Version4.0.2
XenXen Version4.0.3
XenXen Version4.0.4
XenXen Version4.1.0
XenXen Version4.1.1
XenXen Version4.1.2
XenXen Version4.1.3
XenXen Version4.1.4
XenXen Version4.1.5
XenXen Version4.1.6
XenXen Version4.1.6.1
XenXen Version4.2.0
XenXen Version4.2.1
XenXen Version4.2.2
XenXen Version4.2.3
XenXen Version4.2.4
XenXen Version4.2.5
XenXen Version4.3.0
XenXen Version4.3.1
XenXen Version4.3.2
XenXen Version4.3.3
XenXen Version4.3.4
CanonicalUbuntu Linux Version12.04 SwEditionlts
DebianDebian Linux Version6.0
NovellSuse Linux Enterprise Debuginfo Version11 Updatesp4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.16% 0.38
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.4 0.8 3.6
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 1.7 3.1 2.9
AV:L/AC:L/Au:S/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.