Vulnerability Name: | CVE-2007-5907 (CCN-38880) | ||||||||||||||||||||||||
Assigned: | 2007-10-29 | ||||||||||||||||||||||||
Published: | 2007-10-29 | ||||||||||||||||||||||||
Updated: | 2017-09-29 | ||||||||||||||||||||||||
Summary: | Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash). | ||||||||||||||||||||||||
CVSS v3 Severity: | 2.8 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 4.7 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C) 3.6 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)
1.3 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:TF/RC:C)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-5907 Source: SUSE Type: UNKNOWN SUSE-SR:2008:001 Source: CCN Type: Xen-devel Mailing List, Mon, 29 Oct 2007 11:46:21 +0000 [PATCH] x86: allow pv guests to disable TSC for applications Source: MLIST Type: UNKNOWN [Xen-devel] 20071029 [PATCH] x86: allow pv guests to disable TSC for applications Source: CCN Type: RHSA-2008-0957 Important: kernel security and bug fix update Source: CCN Type: SA28405 Xen DR7 and CR4 Register Handling Denial of Service Vulnerabilities Source: SECUNIA Type: UNKNOWN 28405 Source: SECUNIA Type: UNKNOWN 28412 Source: SECUNIA Type: UNKNOWN 28636 Source: SECUNIA Type: UNKNOWN 32485 Source: SUSE Type: UNKNOWN SUSE-SR:2008:002 Source: REDHAT Type: UNKNOWN RHSA-2008:0957 Source: BID Type: UNKNOWN 27219 Source: CCN Type: BID-27219 Xen DR7 and CR4 Registers Multiple Local Denial of Service Vulnerabilities Source: CCN Type: Xen Web site Xen Source: XF Type: UNKNOWN xen-cr4-tsc-dos(38880) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10380 Source: SUSE Type: SUSE-SR:2008:001 SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2008:002 SUSE Security Summary Report | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: ![]() | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |