CVE-2013-1917Improper Input Validation in XEN

Severity
1.9LOWNVD
EPSS
0.1%
top 77.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 13
Latest updateMay 17

Description

Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.

CVSS vector

AV:L/AC:M/C:N/I:N/A:PExploitability: 3.4 | Impact: 2.9

Affected Packages3 packages

debiandebian/xen< xen 4.1.4-3 (bookworm)
Debianxen/xen< 4.1.4-3+3
NVDxen/xen27 versions+26

🔴Vulnerability Details

2
GHSA
GHSA-mrjv-6f7h-m3rj: Xen 32022-05-17
OSV
CVE-2013-1917: Xen 32013-05-13

📋Vendor Advisories

2
Red Hat
kernel: xen: Xen PV DoS vulnerability with SYSENTER2013-04-18
Debian
CVE-2013-1917: xen - Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the...2013

💬Community

2
Bugzilla
CVE-2013-1917 kernel: xen: Xen PV DoS vulnerability with SYSENTER [fedora-all]2013-04-18
Bugzilla
CVE-2013-1917 kernel: xen: Xen PV DoS vulnerability with SYSENTER2013-04-10