First published: Wed Aug 28 2013(Updated: )
The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Xen xen-unstable | =3.3.0 | |
Xen xen-unstable | =3.3.1 | |
Xen xen-unstable | =3.3.2 | |
Xen xen-unstable | =3.4.0 | |
Xen xen-unstable | =3.4.1 | |
Xen xen-unstable | =3.4.2 | |
Xen xen-unstable | =3.4.3 | |
Xen xen-unstable | =3.4.4 | |
Xen xen-unstable | =4.0.0 | |
Xen xen-unstable | =4.0.1 | |
Xen xen-unstable | =4.0.2 | |
Xen xen-unstable | =4.0.3 | |
Xen xen-unstable | =4.0.4 | |
Xen xen-unstable | =4.1.0 | |
Xen xen-unstable | =4.1.1 | |
Xen xen-unstable | =4.1.2 | |
Xen xen-unstable | =4.1.3 | |
Xen xen-unstable | =4.1.4 | |
Xen xen-unstable | =4.1.5 | |
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3495 is rated as a high severity vulnerability due to its potential to cause kernel panic and denial of service.
To fix CVE-2013-3495, upgrade to a patched version of Xen or apply the relevant updates provided by your distribution.
CVE-2013-3495 affects Xen versions from 3.3.x through 4.3.x, including specific versions like 3.3.1, 4.1.5, and others.
CVE-2013-3495 can be exploited by local guests sending a malformed Message Signaled Interrupt (MSI) from a bus mastering capable PCI device.
Exploiting CVE-2013-3495 can lead to a denial of service condition resulting in a kernel panic, impacting the stability of the host system.