The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://security.gentoo.org/glsa/201504-04 | vendor-advisory x_refsource_GENTOO |
| http://secunia.com/advisories/62672 | third-party-advisory x_refsource_SECUNIA |
| http://support.citrix.com/article/CTX201794 | x_refsource_CONFIRM |
| http://support.citrix.com/article/CTX200288 | x_refsource_CONFIRM |
| http://xenbits.xen.org/xsa/advisory-111.html | x_refsource_CONFIRM |
| http://www.debian.org/security/2015/dsa-3140 | vendor-advisory x_refsource_DEBIAN |
| http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html | vendor-advisory x_refsource_SUSE |
| http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html | vendor-advisory x_refsource_SUSE |
| http://www.securityfocus.com/bid/71332 | vdb-entry x_refsource_BID |
| http://secunia.com/advisories/59937 | third-party-advisory x_refsource_SECUNIA |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://security.gentoo.org/glsa/201504-04 | vendor-advisory x_refsource_GENTOO x_transferred |
| http://secunia.com/advisories/62672 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://support.citrix.com/article/CTX201794 | x_refsource_CONFIRM x_transferred |
| http://support.citrix.com/article/CTX200288 | x_refsource_CONFIRM x_transferred |
| http://xenbits.xen.org/xsa/advisory-111.html | x_refsource_CONFIRM x_transferred |
| http://www.debian.org/security/2015/dsa-3140 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html | vendor-advisory x_refsource_SUSE x_transferred |
| http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html | vendor-advisory x_refsource_SUSE x_transferred |
| http://www.securityfocus.com/bid/71332 | vdb-entry x_refsource_BID x_transferred |
| http://secunia.com/advisories/59937 | third-party-advisory x_refsource_SECUNIA x_transferred |