Xen p2m mappings privilege escalation | CVE-2022-23033
NAME
Xen p2m mappings privilege escalation
- Platforms Affected:
XenSource Xen 5.1
XenSource Xen 4.12
XenSource Xen 4.13
XenSource Xen 4.14
XenSource Xen 4.12.3
XenSource Xen 4.12.4
XenSource Xen 4.13.1
XenSource Xen 4.18
XenSource Xen 5.5.0
XenSource Xen 4.15 - Risk Level:
8.4 - Exploitability:
Unproven - Consequences:
Denial of Service
DESCRIPTION
Xen could allow a local attacker to gain elevated privileges on the system, caused by an error when guest_physmap_remove_page fails to remove the p2m mappings. An attacker could exploit this vulnerability to gain elevated privileges on the system, obtain sensitive information and cause a denial of service on the host.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Access Vector: Local
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Official Fix
MITIGATION
Refer to Xen Security Advisory XSA-393 for patch, upgrade or suggested workaround information. See References.
- Reference Link:
http://xenbits.xen.org/xsa/advisory-393.html - Reference Link:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.