CVE-2014-5147

Severity

43%

Complexity

25%

Confidentiality

115%

Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.

Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: high. CVSS Vector: (AV:A/AC:H/Au:S/C:N/I:N/A:C).

Overview

Type

Xen

First reported 10 years ago

2014-08-29 16:55:00

Last updated 6 years ago

2018-10-30 16:26:00

Affected Software

Xen Xen 4.4.0

4.4.0

Xen 4.4.0 release candidate 1

4.4.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.