First published: Thu Jun 23 2011(Updated: )
Problem description: Intel VT-d chipsets without interrupt remapping do not prevent a guest which owns a PCI device from using DMA to generate MSI interrupts by writing to the interrupt injection registers. This can be exploited to inject traps and gain control of the host. References: <a href="http://lists.xensource.com/archives/html/xen-devel/2011-05/msg00687.html">http://lists.xensource.com/archives/html/xen-devel/2011-05/msg00687.html</a> <a href="http://theinvisiblethings.blogspot.com/2011/05/following-white-rabbit-software-attacks.html">http://theinvisiblethings.blogspot.com/2011/05/following-white-rabbit-software-attacks.html</a> <a href="http://www.invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdf">http://www.invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdf</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
XenServer | =4.0.0 | |
XenServer | =4.0.1 | |
XenServer | =4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.