CVE-2013-4368Sensitive Information Exposure in XEN

Severity
1.9LOWNVD
EPSS
0.1%
top 73.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 17
Latest updateMay 17

Description

The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.

CVSS vector

AV:L/AC:M/C:P/I:N/A:NExploitability: 3.4 | Impact: 2.9

Affected Packages3 packages

debiandebian/xen< xen 4.4.0-1 (bookworm)
Debianxen/xen< 4.4.0-1+3
NVDxen/xen4.3.0+33

🔴Vulnerability Details

2
GHSA
GHSA-x5cw-86rm-555x: The outs instruction emulation in Xen 32022-05-17
OSV
CVE-2013-4368: The outs instruction emulation in Xen 32013-10-17

📋Vendor Advisories

8
Red Hat
xen: information leak through outs instruction emulation (XSA-67)2013-10-10
Debian
CVE-2013-4368: xen - The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when usi...2013
Citrix
Citrix Security Bulletin CTX136623
Citrix
Citrix Security Bulletin CTX135815
Citrix
Citrix Security Bulletin CTX140113

💬Community

2
Bugzilla
CVE-2013-4371 CVE-2013-4370 CVE-2013-4368 CVE-2013-4369 CVE-2013-4375 xen: various flaws [fedora-all]2013-10-10
Bugzilla
CVE-2013-4368 xen: information leak through outs instruction emulation (XSA-67)2013-09-26