oss-sec mailing list archives

Re: Xen Security Advisory 98 - insufficient permissions checks accessing guest memory on ARM


From: cve-assign () mitre org
Date: Wed, 4 Jun 2014 11:00:16 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

XSA-98

When accessing guest memory Xen does not correctly perform permissions
checks on the (possibly guest provided) virtual address ... This
allows a guest to write to memory which it should only be able to
read.

In the event that a guest executes code from a page which has been
shared read-only with another guest it would be possible to mount a
take over attack on that guest.

Use CVE-2014-3969.

Our understanding is that "executes code from a page which has been
shared read-only" depends on the permissions issue (lack of a check
for execute permission), and is not an independent problem.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTjzQrAAoJEKllVAevmvmsAYQH/1c5OC4rp6+bZvWaV6eM0INm
PP2t2rOZhNjbc25Swzm7E0lnV7ZMk1Tsz8rnhd+jnf72abro9t0B87QIUGEjRIo+
mTz7CJJohynIT785wXFDTZaUJuJefi6me7KaIVKQPV37St26g0xY8O1uXLmBxxqh
av0oF+ImYNZbFaTZEeGLF2gN4V54W2CZe2T3de5dn1oWemdKceJI6DWEX4NHoV/l
zzAG/6/6+t/lnwSMQhfYYOgacs4u8kkrXzPCzzEZWf3ScJilawToIDU0wAO5ya5e
//kLQs+PD8ENUPS41L1GjC172szfmMUmDqsDfuaJTkddmBnsXZzd50cSf24yiVc=
=eSfY
-----END PGP SIGNATURE-----


Current thread: