MEDIUM · 6.2

CVE-2014-3125

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) ...

Vulnerability Description

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

CVSS Score

6.2

MEDIUM

AV:A/AC:L/Au:S/C:N/I:P/A:C
Confidentiality
NONE
Integrity
PARTIAL
Availability
COMPLETE

Affected Products

VendorProductVersions
XenXen4.4.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3125?

CVE-2014-3125 is a vulnerability with a CVSS score of 6.2 (MEDIUM). Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) ...

How severe is CVE-2014-3125?

CVE-2014-3125 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3125?

Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.