CVE-2018-19966Allocation of Resources Without Limits or Throttling in XEN

Severity
8.8HIGHNVD
EPSS
0.1%
top 68.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Latest updateMay 13

Description

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0

Affected Packages3 packages

debiandebian/xen< xen 4.11.1-1 (bookworm)
Debianxen/xen< 4.11.1-1+3
NVDxen/xen4.11.04.11.1

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3635-87f7-gfgj: An issue was discovered in Xen through 42022-05-13
OSV
CVE-2018-19966: An issue was discovered in Xen through 42018-12-08

📋Vendor Advisories

2
Red Hat
xen: Conflicts with shadow paging due to XSA-240 incomplete fix (XSA-280)2018-11-20
Debian
CVE-2018-19966: xen - An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to ...2018

💬Community

2
Bugzilla
CVE-2018-19966 xsa280 xen: Conflicts with shadow paging due to XSA-240 incomplete fix (XSA-280)2018-11-21
Bugzilla
CVE-2018-19963 CVE-2018-19964 CVE-2018-19966 xen: various flaws [fedora-all]2018-11-21