Vulnerability Description
The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensuse | Opensuse | 13.1 |
| Xen | Xen | 3.3.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.htmlThird Party Advisory
- http://osvdb.org/96438Broken Link
- http://secunia.com/advisories/54341
- http://www.openwall.com/lists/oss-security/2013/08/20/8Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/61854Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1028931Third Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201504-04
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.htmlThird Party Advisory
- http://osvdb.org/96438Broken Link
- http://secunia.com/advisories/54341
- http://www.openwall.com/lists/oss-security/2013/08/20/8Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/61854Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1028931Third Party AdvisoryVDB Entry
FAQ
What is CVE-2013-3495?
CVE-2013-3495 is a vulnerability with a CVSS score of 4.7 (MEDIUM). The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device ...
How severe is CVE-2013-3495?
CVE-2013-3495 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3495?
Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Opensuse, Xen Xen.