CVE-2013-4355

CVSS V2 Low 1.5 CVSS V3 None
Description
Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
Overview
  • CVE ID
  • CVE-2013-4355
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2013-10-01T17:55:03
  • Last Modified Date
  • 2023-02-13T00:28:53
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* 1 OR 4.3.0
cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:M/Au:S/C:P/I:N/A:N
  • Access Vector
  • LOCAL
  • Access Compatibility
  • MEDIUM
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 1.5
  • Severity
  • LOW
  • Exploitability Score
  • 2.7
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 09:51:31 Added to TrackCVE
2022-12-01 19:57:22 2013-10-01T17:55Z 2013-10-01T17:55:03 CVE Published Date updated
2022-12-01 19:57:22 2017-01-07T02:59:10 CVE Modified Date updated
2022-12-01 19:57:22 Modified Vulnerability Status updated
2023-02-02 21:03:59 2023-02-02T20:15:41 CVE Modified Date updated
2023-02-02 21:04:00 Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory. CVE-2013-4355 Kernel: Xen: Xsa-63: information leak via I/O instruction emulation Description updated
2023-02-02 21:04:02 References updated
2023-02-13 01:04:28 2023-02-13T00:28:53 CVE Modified Date updated
2023-02-13 01:04:29 CVE-2013-4355 Kernel: Xen: Xsa-63: information leak via I/O instruction emulation Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory. Description updated