First published: Fri Nov 15 2013(Updated: )
Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4551 is classified as a medium severity vulnerability as it can lead to denial of service through host crash.
To fix CVE-2013-4551, you should upgrade to a patched version of Xen that addresses the vulnerability.
CVE-2013-4551 affects Xen versions 4.2.0 through 4.2.3 and 4.3.0 through 4.3.1.
The impact of CVE-2013-4551 is a potential denial of service that could cause the host system to crash.
CVE-2013-4551 occurs when nested virtualization is disabled, allowing local HVM guest users to exploit the vulnerability.