Vulnerability Name:

CVE-2011-1936 (CCN-68424)

Assigned:2011-07-07
Published:2011-07-07
Updated:2014-02-25
Summary:Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:A/AC:H/Au:N/C:N/I:N/A:C)
3.4 Low (Temporal CVSS v2 Vector: AV:A/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
4.9 Medium (REDHAT CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
3.7 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2011-1936

Source: CCN
Type: RHSA-2011-0927
Important: kernel security and bug fix update

Source: REDHAT
Type: UNKNOWN
RHSA-2011:0927

Source: MLIST
Type: UNKNOWN
[oss-security] 20110707 CVE-2011-1780, CVE-2011-1936, kernel/xen issues

Source: CCN
Type: OSVDB ID: 74868
Xen VM Exit CPUID Instruction Emulation Handling Unprivileged Local DoS

Source: CCN
Type: BID-48610
Xen Instruction Emulation During VM Exits Denial of Service Vulnerabilities

Source: CCN
Type: XenSource Web site
Xen

Source: CCN
Type: Red Hat Bugzilla Bug 706323
(CVE-2011-1936) CVE-2011-1936 kernel: xen: vmx: insecure cpuid vmexit

Source: XF
Type: UNKNOWN
xen-cpuid-dos(68424)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:xen:xen:-:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:xensource:xen:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:5.6.z::server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20111936
    V
    CVE-2011-1936
    2017-09-27
    oval:org.mitre.oval:def:23330
    P
    ELSA-2011:0927: kernel security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:21896
    P
    RHSA-2011:0927: kernel security and bug fix update (Important)
    2014-02-24
    oval:org.mitre.oval:def:20208
    V
    VMware ESXi and ESX updates to third party library and ESX Service Console
    2014-01-20
    oval:com.ubuntu.precise:def:20111936000
    V
    CVE-2011-1936 on Ubuntu 12.04 LTS (precise) - medium.
    2014-01-07
    oval:com.redhat.rhsa:def:20110927
    P
    RHSA-2011:0927: kernel security and bug fix update (Important)
    2011-07-15
    BACK
    xen xen -
    xensource xen *
    redhat enterprise linux 5
    redhat enterprise linux 5
    redhat enterprise linux eus 5.6.z
    redhat enterprise linux long life 5.6