CVE-2011-1898
Published Aug 12, 2011
Last updated 13 years ago
Overview
- Description
- Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.4
- Impact score
- 10
- Exploitability score
- 4.4
- Vector string
- AV:A/AC:M/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:xen:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCB3C3E5-3A28-4CC6-806F-8B47CD4C9FC4" }, { "criteria": "cpe:2.3:a:citrix:xen:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85FC6697-35A5-419F-AFD1-9F327A0613BD" }, { "criteria": "cpe:2.3:a:citrix:xen:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "385F592C-CDE0-4AB8-9C1B-7884776055CF" } ], "operator": "OR" } ] } ]