Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062112.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062139.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00017.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00018.html - | |
References | () http://theinvisiblethings.blogspot.com/2011/05/following-white-rabbit-software-attacks.html - | |
References | () http://www.invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdf - Exploit | |
References | () http://xen.1045712.n5.nabble.com/Xen-security-advisory-CVE-2011-1898-VT-d-PCI-passthrough-MSI-td4390298.html - | |
References | () http://xen.org/download/index_4.0.2.html - Patch |
Information
Published : 2011-08-12 18:55
Updated : 2024-11-21 01:27
NVD link : CVE-2011-1898
Mitre link : CVE-2011-1898
CVE.ORG link : CVE-2011-1898
JSON object : View
Products Affected
citrix
- xen
CWE
CWE-264
Permissions, Privileges, and Access Controls