CVE-2013-1917
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
13/05/2013
Last modified:
11/04/2025
Description
Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
Impact
Base Score 2.0
1.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://www.debian.org/security/2012/dsa-2662
- http://www.openwall.com/lists/oss-security/2013/04/18/8
- http://www.securitytracker.com/id/1028455
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://www.debian.org/security/2012/dsa-2662
- http://www.openwall.com/lists/oss-security/2013/04/18/8
- http://www.securitytracker.com/id/1028455



