CVE-2013-4355
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
01/10/2013
Last modified:
11/04/2025
Description
Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
Impact
Base Score 2.0
1.50
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | 4.3.0 (including) | |
cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html
- http://rhn.redhat.com/errata/RHSA-2013-1790.html
- http://security.gentoo.org/glsa/glsa-201407-03.xml
- http://www.debian.org/security/2014/dsa-3006
- http://www.openwall.com/lists/oss-security/2013/09/30/1
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html
- http://rhn.redhat.com/errata/RHSA-2013-1790.html
- http://security.gentoo.org/glsa/glsa-201407-03.xml
- http://www.debian.org/security/2014/dsa-3006
- http://www.openwall.com/lists/oss-security/2013/09/30/1