CVE-2014-8594 Detail
Modified
This vulnerability has been modified since it was last analyzed by the NVD. It is awaiting reanalysis which may result in further changes to the information provided.
Current Description
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
Source:
MITRE
Description Last Modified:
09/28/2016
View Analysis Description
Analysis Description
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer derference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
Source:
MITRE
Description Last Modified:
11/19/2014
Impact
CVSS v2.0 Severity and Metrics:
Base Score:
5.4 MEDIUM
Vector:
(AV:N/AC:H/Au:N/C:N/I:N/A:C)
(V2 legend)
Impact Subscore:
6.9
Exploitability Subscore:
4.9
Access Vector (AV):
Network
Access Complexity (AC):
High
Authentication (AU):
None
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
Complete
Additional Information:
Allows disruption of service
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
Change History
15 change records found
- show changes
CPE Deprecation Remap -
10/30/2018 12:27:37 PM
| Action |
Type |
Old Value |
New Value |
| Changed |
CPE Configuration |
OR
*cpe:2.3:o:novell:opensuse:13.2:*:*:*:*:*:*:* |
OR
*cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* |
CPE Deprecation Remap -
10/30/2018 12:27:35 PM
| Action |
Type |
Old Value |
New Value |
| Changed |
CPE Configuration |
OR
*cpe:2.3:o:novell:opensuse:13.1:*:*:*:*:*:*:* |
OR
*cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* |
CVE Modified by MITRE -
9/7/2017 9:29:25 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Reference |
|
https://exchange.xforce.ibmcloud.com/vulnerabilities/98767 [No Types Assigned] |
| Removed |
Reference |
http://xforce.iss.net/xforce/xfdb/98767 [No Types Assigned] |
|
CVE Modified by MITRE -
1/6/2017 10:00:32 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Reference |
|
http://www.securityfocus.com/bid/71149 [No Types Assigned] |
| Added |
Reference |
|
http://xforce.iss.net/xforce/xfdb/98767 [No Types Assigned] |
CVE Modified by MITRE -
12/21/2016 9:59:19 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Reference |
|
https://security.gentoo.org/glsa/201504-04 [No Types Assigned] |
Modified Analysis -
9/30/2016 8:35:50 AM
| Action |
Type |
Old Value |
New Value |
| Changed |
CPE Configuration |
Record truncated, showing 500 of 1126 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.4: |
Record truncated, showing 500 of 1126 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:o:novell:opensuse:13.1:*:*:*:*:*:*:*
*cpe:2.3:o:novell:opensuse:13.2:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
*c |
| Changed |
Reference Type |
http://secunia.com/advisories/62672 No Types Assigned |
http://secunia.com/advisories/62672 Permissions Required |
Initial CVE Analysis -
9/30/2016 8:35:48 AM
| Action |
Type |
Old Value |
New Value |
| Changed |
CPE Configuration |
Record truncated, showing 500 of 1126 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:o:novell:opensuse:13.1:*:*:*:*:*:*:*
*cpe:2.3:o:novell:opensuse:13.2:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
*c |
Record truncated, showing 500 of 1126 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.4: |
| Changed |
Reference Type |
http://secunia.com/advisories/62672 No Types Assigned |
http://secunia.com/advisories/62672 Permissions Required |
CVE Translated -
9/29/2016 5:45:01 AM
| Action |
Type |
Old Value |
New Value |
| Added |
Translation |
|
La función do_mmu_update en arch/x86/mm.c en Xen 4.x hasta la versión 4.4.x no restringe adecuadamente las actualizaciones a las tablas de página sólo para PV, lo que permite a invitados PV remotos provocar una denegación de servicio (referencia a puntero NULL) aprovechando los servicios de emulación de hardware para invitados HVM que utilizan Hardware Assisted Paging (HAP). |
| Removed |
Translation |
La función do_mnu_uptadte en arch/x86/mm.c en Xen 4.x a través de 4.4.x no restringe adecuadamente las actualizaciones a las tablas de las páginas unicamente para PV, lo que permite a usuarios PV remotos provocar una denegación de servicio (referencia a puntero nulo) mediante el aprovechamiento de los servicios de emulación de hardware para los clientes que utilizan HVM Hardware Assisted Paging (HAP). |
|
CVE Modified by Source -
9/28/2016 9:59:08 PM
| Action |
Type |
Old Value |
New Value |
| Changed |
Description |
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer derference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP). |
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP). |
Modified Analysis -
8/31/2016 11:14:06 AM
| Action |
Type |
Old Value |
New Value |
| Changed |
CPE Configuration |
Record truncated, showing 500 of 907 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.4: |
Record truncated, showing 500 of 1126 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.4: |
| Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html No Types Assigned |
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html Third Party Advisory |
| Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html No Types Assigned |
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html Third Party Advisory |
| Changed |
Reference Type |
http://www.debian.org/security/2015/dsa-3140 No Types Assigned |
http://www.debian.org/security/2015/dsa-3140 Third Party Advisory |
| Changed |
Reference Type |
http://xenbits.xen.org/xsa/advisory-109.html Vendor Advisory |
http://xenbits.xen.org/xsa/advisory-109.html Vendor Advisory, Patch |
CVE Modified by Source -
3/17/2015 10:02:59 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Reference |
|
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html |
| Added |
Reference |
|
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html |
CVE Modified by Source -
2/25/2015 9:59:05 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Reference |
|
http://www.debian.org/security/2015/dsa-3140 |
CVE Modified by Source -
2/10/2015 9:59:58 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Reference |
|
http://secunia.com/advisories/62672 |
CVE Translated -
12/5/2014 4:45:00 AM
| Action |
Type |
Old Value |
New Value |
| Added |
Translation |
|
La función do_mnu_uptadte en arch/x86/mm.c en Xen 4.x a través de 4.4.x no restringe adecuadamente las actualizaciones a las tablas de las páginas unicamente para PV, lo que permite a usuarios PV remotos provocar una denegación de servicio (referencia a puntero nulo) mediante el aprovechamiento de los servicios de emulación de hardware para los clientes que utilizan HVM Hardware Assisted Paging (HAP). |
| Removed |
Translation |
La función do_mnu_uptadte en arch/x86/mm.c en Xen 4.x a través de 4.4.x no restringe adecuadamente los cambios de las tablas de las páginas sólo las tablas de página PV, permitiendo a usuarios PV remotos provocar una denegación de servicio (puntero NULL derference) aprovechandolos servicios de emulación de hardware para los clientes que utilizan HVM Hardware Assisted Paging (HAP). |
|
Initial CVE Analysis -
11/19/2014 3:01:48 PM
| Action |
Type |
Old Value |
New Value |
| Added |
CPE Configuration |
|
Record truncated, showing 500 of 907 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:4.1.4: |
| Added |
CVSS V2 |
|
(AV:N/AC:H/Au:N/C:N/I:N/A:C) |
| Added |
CWE |
|
CWE-20 |
| Changed |
Reference Type |
http://xenbits.xen.org/xsa/advisory-109.html No Types Assigned |
http://xenbits.xen.org/xsa/advisory-109.html Advisory |
Quick Info
CVE Dictionary Entry:
CVE-2014-8594
NVD Published Date:
11/19/2014
NVD Last Modified:
10/30/2018
|