Vulnerability Description
The xenlight library (libxl) in Xen 4.0.x through 4.2.x, when IOMMU is disabled, provides access to a busmastering-capable PCI passthrough device before the IOMMU setup is complete, which allows local HVM guest domains to gain privileges or cause a denial of service via a DMA instruction.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | 4.0.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.xen.org/archives/html/xen-devel/2013-07/msg00066.htmlPatch
- http://security.gentoo.org/glsa/glsa-201407-03.xml
- http://www.debian.org/security/2014/dsa-3006
- http://www.openwall.com/lists/oss-security/2013/09/10/4
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.xen.org/archives/html/xen-devel/2013-07/msg00066.htmlPatch
- http://security.gentoo.org/glsa/glsa-201407-03.xml
- http://www.debian.org/security/2014/dsa-3006
- http://www.openwall.com/lists/oss-security/2013/09/10/4
FAQ
What is CVE-2013-4329?
CVE-2013-4329 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The xenlight library (libxl) in Xen 4.0.x through 4.2.x, when IOMMU is disabled, provides access to a busmastering-capable PCI passthrough device before the IOMMU setup is complete, which allows local...
How severe is CVE-2013-4329?
CVE-2013-4329 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4329?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.