Vulnerability Details : CVE-2011-1898
Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
Exploit prediction scoring system (EPSS) score for CVE-2011-1898
Probability of exploitation activity in the next 30 days: 0.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 28 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1898
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.4
|
HIGH | AV:A/AC:M/Au:S/C:C/I:C/A:C |
4.4
|
10.0
|
NIST |
CWE ids for CVE-2011-1898
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1898
-
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00017.html
[security-announce] openSUSE-SU-2011:0941-1: important: xen: Fixed a sec
-
http://xen.1045712.n5.nabble.com/Xen-security-advisory-CVE-2011-1898-VT-d-PCI-passthrough-MSI-td4390298.html
Xen - Dev - Xen security advisory CVE-2011-1898 - VT-d (PCI passthrough) MSI
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062112.html
[SECURITY] Fedora 15 Update: xen-4.1.1-1.fc15
-
http://xen.org/download/index_4.0.2.html
Page not found - Xen ProjectPatch
-
http://www.invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdf
Exploit
-
http://theinvisiblethings.blogspot.com/2011/05/following-white-rabbit-software-attacks.html
The Invisible Things Lab's blog: Following the White Rabbit: Software Attacks Against Intel VT-d
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062139.html
[SECURITY] Fedora 14 Update: xen-4.0.2-1.fc14
-
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00018.html
[security-announce] SUSE-SU-2011:0942-1: important: Security update for
Products affected by CVE-2011-1898
- cpe:2.3:a:citrix:xen:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xen:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xen:4.0.1:*:*:*:*:*:*:*