CVE-2014-1642Out-of-bounds Write in XEN

CWE-3997 documents6 sources
Severity
4.4MEDIUMNVD
EPSS
0.2%
top 60.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 26
Latest updateMay 14

Description

The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.

CVSS vector

AV:L/AC:M/C:P/I:P/A:PExploitability: 3.4 | Impact: 6.4

Affected Packages3 packages

debiandebian/xen< xen 4.4.0-1 (bookworm)
Debianxen/xen< 4.4.0-1+3
NVDxen/xen6 versions+5

🔴Vulnerability Details

2
GHSA
GHSA-gjr7-r3wr-cjpp: The IRQ setup in Xen 42022-05-14
OSV
CVE-2014-1642: The IRQ setup in Xen 42014-01-26

📋Vendor Advisories

2
Red Hat
xen: out-of-memory condition yielding memory corruption during IRQ setup2014-01-23
Debian
CVE-2014-1642: xen - The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configur...2014

💬Community

2
Bugzilla
CVE-2014-1642 xen: out-of-memory condition yielding memory corruption during IRQ setup [fedora-all]2014-01-23
Bugzilla
CVE-2014-1642 xen: out-of-memory condition yielding memory corruption during IRQ setup2014-01-23