CVE-2018-15468

Published Aug 17, 2018

Last updated 5 years ago

Overview

Description
An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.
Source
cve@mitre.org
NVD status
Analyzed

Risk scores

CVSS 3.0

Type
Primary
Base score
6
Impact score
4
Exploitability score
1.5
Vector string
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
4.9
Impact score
6.9
Exploitability score
3.9
Vector string
AV:L/AC:L/Au:N/C:N/I:N/A:C

Weaknesses

nvd@nist.gov
CWE-863

Social media

Hype score
Not currently trending

Configurations