CVE-2013-1952Improper Input Validation in XEN

Severity
1.9LOWNVD
EPSS
0.1%
top 78.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 13
Latest updateMay 17

Description

Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors.

CVSS vector

AV:L/AC:M/C:N/I:N/A:PExploitability: 3.4 | Impact: 2.9

Affected Packages3 packages

debiandebian/xen< xen 4.1.4-4 (bookworm)
Debianxen/xen< 4.1.4-4+3
NVDxen/xen13 versions+12

🔴Vulnerability Details

2
GHSA
GHSA-xchh-r483-j5m5: Xen 42022-05-17
OSV
CVE-2013-1952: Xen 42013-05-13

📋Vendor Advisories

2
Red Hat
kernel: xen: VT-d interrupt remapping source validation flaw for bridges2013-05-02
Debian
CVE-2013-1952: xen - Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not ...2013

💬Community

2
Bugzilla
CVE-2013-1952 kernel: xen: VT-d interrupt remapping source validation flaw for bridges [fedora-all]2013-05-02
Bugzilla
CVE-2013-1952 kernel: xen: VT-d interrupt remapping source validation flaw for bridges2013-04-24