CVE-2013-4551 — Improper Input Validation in XEN
Severity
5.7MEDIUMNVD
EPSS
0.4%
top 37.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 18
Latest updateMay 17
Description
Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
CVSS vector
AV:A/AC:M/C:N/I:N/A:CExploitability: 5.5 | Impact: 6.9