TROYANOSYVIRUS
Back to CVEs

CVE-2015-8551

MEDIUM
6.0

Description

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."

CVE Details

CVSS v3.1 Score6.0
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published4/13/2016
Last Modified4/12/2025
Sourcenvd
Honeypot Sightings0

Affected Products

debian:debian_linuxlinux:linux_kernelopensuse:opensusesuse:linux_enterprise_desktopsuse:linux_enterprise_real_time_extensionsuse:linux_enterprise_serversuse:linux_enterprise_software_development_kitsuse:linux_enterprise_workstation_extension

Weaknesses (CWE)

CWE-476

References

http://www.debian.org/security/2016/dsa-3434(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/79546(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1034480(af854a3a-2127-422b-91ae-364da2661108)
http://xenbits.xen.org/xsa/advisory-157.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201604-03(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.