oss-sec mailing list archives
Re: Xen Security Advisory 98 - insufficient permissions checks accessing guest memory on ARM
From: cve-assign () mitre org
Date: Wed, 4 Jun 2014 11:00:16 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
XSA-98
When accessing guest memory Xen does not correctly perform permissions checks on the (possibly guest provided) virtual address ... This allows a guest to write to memory which it should only be able to read.
In the event that a guest executes code from a page which has been shared read-only with another guest it would be possible to mount a take over attack on that guest.
Use CVE-2014-3969. Our understanding is that "executes code from a page which has been shared read-only" depends on the permissions issue (lack of a check for execute permission), and is not an independent problem. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJTjzQrAAoJEKllVAevmvmsAYQH/1c5OC4rp6+bZvWaV6eM0INm PP2t2rOZhNjbc25Swzm7E0lnV7ZMk1Tsz8rnhd+jnf72abro9t0B87QIUGEjRIo+ mTz7CJJohynIT785wXFDTZaUJuJefi6me7KaIVKQPV37St26g0xY8O1uXLmBxxqh av0oF+ImYNZbFaTZEeGLF2gN4V54W2CZe2T3de5dn1oWemdKceJI6DWEX4NHoV/l zzAG/6/6+t/lnwSMQhfYYOgacs4u8kkrXzPCzzEZWf3ScJilawToIDU0wAO5ya5e //kLQs+PD8ENUPS41L1GjC172szfmMUmDqsDfuaJTkddmBnsXZzd50cSf24yiVc= =eSfY -----END PGP SIGNATURE-----
Current thread:
- Xen Security Advisory 98 - insufficient permissions checks accessing guest memory on ARM Xen . org security team (Jun 04)
- Re: Xen Security Advisory 98 - insufficient permissions checks accessing guest memory on ARM cve-assign (Jun 04)