LOW · 1.9

CVE-2013-1917

Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hype...

Vulnerability Description

Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.

CVSS Score

1.9

LOW

AV:L/AC:M/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
XenXen3.1.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-1917?

CVE-2013-1917 is a vulnerability with a CVSS score of 1.9 (LOW). Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hype...

How severe is CVE-2013-1917?

CVE-2013-1917 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-1917?

Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.