ID

VAR-202004-0465


CVE

CVE-2020-11743


TITLE

Xen Vulnerability in handling exceptional conditions in

Trust: 0.8

sources: JVNDB: JVNDB-2020-004781

DESCRIPTION

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain. Xen Is vulnerable to handling exceptional conditions.Service operation interruption (DoS) It may be put into a state. Xen is an open source virtual machine monitor product from the University of Cambridge. The product enables different and incompatible operating systems to run on the same computer and supports migration during runtime to ensure normal operation and avoid downtime. There are security vulnerabilities in Xen 4.13.x and previous versions. An attacker can use this vulnerability to cause a denial of service. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202005-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Xen: Multiple vulnerabilities Date: May 14, 2020 Bugs: #717446 ID: 202005-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Xen, the worst of which could allow privilege escalation. Background ========== Xen is a bare-metal hypervisor. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-emulation/xen < 4.12.2-r2 >= 4.12.2-r2 2 app-emulation/xen-tools < 4.12.2-r2 >= 4.12.2-r2 ------------------------------------------------------------------- 2 affected packages Description =========== Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Xen users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.12.2-r2" References ========== [ 1 ] CVE-2020-11739 https://nvd.nist.gov/vuln/detail/CVE-2020-11739 [ 2 ] CVE-2020-11740 https://nvd.nist.gov/vuln/detail/CVE-2020-11740 [ 3 ] CVE-2020-11741 https://nvd.nist.gov/vuln/detail/CVE-2020-11741 [ 4 ] CVE-2020-11742 https://nvd.nist.gov/vuln/detail/CVE-2020-11742 [ 5 ] CVE-2020-11743 https://nvd.nist.gov/vuln/detail/CVE-2020-11743 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202005-08 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . For the stable distribution (buster), these problems have been fixed in version 4.11.4+24-gddaaccbbab-1~deb10u1. We recommend that you upgrade your xen packages. For the detailed security status of xen please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xen Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl8Lc/AACgkQEMKTtsN8 TjaMdxAAqGcAm1NI7JRg7LQprevLCPkxPItZapx3n/q/W6HwiGQxC6KP9Ntp3ArR QiIeIPzTWVMHcaahlgkLePaFPU3MCe5TkL0GKG1JIAD8JieKBSrAWJ6tqTiZx+G+ anbksp/I9Mq9nciMlnPXeOVQgksoCB0tFYC2Ld+H7btZdD5G4KpJsz25c0S5poxW sIXLgNXIzmZcI8mVzUlt+w0FG3tnolr/kJppHBkgC46riVcy8LHRaRQiVTjwqjSn Eop4oXxLDZ/qH8k+0JAZLtBPpc9PfQcLxCJnhH8z76QdPPkcJuNFx5zRXqr1dZfG AkRuG6LZa2tRGYzKZmo7BMj5dUei4xhDHLAoWGhSHkTmYtdc1Kyy4+duGPEChSCm fCSC1FhFJFK30iq918cunWtjhRrEqrJr10HuC+YlSXfqrv1Z12fPw3UPRJmdG2Dv UPS5vT8/NwF0osNrvNE+rkhYXTEKECE756pP3jTV4+BBBgf9DLtbV0EvYq1YWlJw iT+KnzX9iW/jJg3bC32+UJlVv7IAkb8F9hcK3wKpvgSUVJIDWN352rfW7p8/xZoj 7eIlmZwDPKWsyMlbt2OsyYQFQlBvNsk0+7ycu9hG6fBaF5ATSxTO+A43Q7OxorP9 g8OhDVMgrx5GM4rXSZ60J6uxkd2eUns4Ud8pDGG8XTpnRBxD8Kk= =tfm7 -----END PGP SIGNATURE-----

Trust: 2.43

sources: NVD: CVE-2020-11743 // JVNDB: JVNDB-2020-004781 // CNVD: CNVD-2020-25872 // VULMON: CVE-2020-11743 // PACKETSTORM: 157721 // PACKETSTORM: 168871

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-25872

AFFECTED PRODUCTS

vendor:xenmodel:xenscope:lteversion:4.13.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.13.0

Trust: 1.0

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:xenmodel:xenscope: - version: -

Trust: 0.8

vendor:xenmodel:xenscope:lteversion:<=4.13.x

Trust: 0.6

sources: CNVD: CNVD-2020-25872 // JVNDB: JVNDB-2020-004781 // NVD: CVE-2020-11743

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-11743
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-004781
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-25872
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202004-657
value: MEDIUM

Trust: 0.6

VULMON: CVE-2020-11743
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-11743
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-004781
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-25872
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-11743
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-004781
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-25872 // VULMON: CVE-2020-11743 // JVNDB: JVNDB-2020-004781 // CNNVD: CNNVD-202004-657 // NVD: CVE-2020-11743

PROBLEMTYPE DATA

problemtype:CWE-755

Trust: 1.8

sources: JVNDB: JVNDB-2020-004781 // NVD: CVE-2020-11743

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202004-657

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202004-657

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-004781

PATCH

title:FEDORA-2020-295ed0b1e0url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5M2XRNCHOGGTJQBZQJ7DCV6ZNAKN3LE2/

Trust: 0.8

title:FEDORA-2020-cbc3149753url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVTP4OYHCTRU3ONFJOFJQVNDFB25KLLG/

Trust: 0.8

title:FEDORA-2020-440457afe4url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YMAW7D2MP6RE4BFI5BZWOBBWGY3VSOFN/

Trust: 0.8

title:XSA-316url:https://xenbits.xen.org/xsa/advisory-316.html

Trust: 0.8

title:Patch for Xen Denial of Service Vulnerability (CNVD-2020-25872)url:https://www.cnvd.org.cn/patchInfo/show/216039

Trust: 0.6

title:Xen Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=113687

Trust: 0.6

title:Citrix Security Bulletins: Citrix Hypervisor Multiple Security Updatesurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=f370ea0c562996cebdbcb6d5adc19514

Trust: 0.1

title:Debian Security Advisories: DSA-4723-1 xen -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=0d177f74e6265e2fdbb8df6fa6c636bf

Trust: 0.1

title:Ubuntu Security Notice: USN-5617-1: Xen vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5617-1

Trust: 0.1

sources: CNVD: CNVD-2020-25872 // VULMON: CVE-2020-11743 // JVNDB: JVNDB-2020-004781 // CNNVD: CNNVD-202004-657

EXTERNAL IDS

db:NVDid:CVE-2020-11743

Trust: 3.3

db:OPENWALLid:OSS-SECURITY/2020/04/14/3

Trust: 2.5

db:JVNDBid:JVNDB-2020-004781

Trust: 0.8

db:PACKETSTORMid:157721

Trust: 0.7

db:CNVDid:CNVD-2020-25872

Trust: 0.6

db:AUSCERTid:ESB-2020.1373

Trust: 0.6

db:AUSCERTid:ESB-2020.1463

Trust: 0.6

db:AUSCERTid:ESB-2020.1575

Trust: 0.6

db:AUSCERTid:ESB-2022.4642

Trust: 0.6

db:AUSCERTid:ESB-2020.2364

Trust: 0.6

db:AUSCERTid:ESB-2020.1317

Trust: 0.6

db:CNNVDid:CNNVD-202004-657

Trust: 0.6

db:VULMONid:CVE-2020-11743

Trust: 0.1

db:PACKETSTORMid:168871

Trust: 0.1

sources: CNVD: CNVD-2020-25872 // VULMON: CVE-2020-11743 // JVNDB: JVNDB-2020-004781 // PACKETSTORM: 157721 // PACKETSTORM: 168871 // CNNVD: CNNVD-202004-657 // NVD: CVE-2020-11743

REFERENCES

url:http://xenbits.xen.org/xsa/advisory-316.html

Trust: 3.4

url:http://www.openwall.com/lists/oss-security/2020/04/14/3

Trust: 2.5

url:https://security.gentoo.org/glsa/202005-08

Trust: 1.8

url:https://www.debian.org/security/2020/dsa-4723

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-11743

Trust: 1.6

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5m2xrnchoggtjqbzqj7dcv6znakn3le2/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nvtp4oyhctru3onfjofjqvndfb25kllg/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ymaw7d2mp6re4bfi5bzwobbwgy3vsofn/

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11743

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ymaw7d2mp6re4bfi5bzwobbwgy3vsofn/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5m2xrnchoggtjqbzqj7dcv6znakn3le2/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nvtp4oyhctru3onfjofjqvndfb25kllg/

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2020-11743

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1317/

Trust: 0.6

url:https://vigilance.fr/vulnerability/xen-denial-of-service-via-gnttabop-map-grant-32010

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4642

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1373/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1463/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2364/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1575/

Trust: 0.6

url:https://packetstormsecurity.com/files/157721/gentoo-linux-security-advisory-202005-08.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-11742

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-11741

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-11739

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-11740

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/755.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://seclists.org/oss-sec/2020/q2/24

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5617-1

Trust: 0.1

url:https://support.citrix.com/article/ctx270837

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15564

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15566

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15567

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15563

Trust: 0.1

url:https://security-tracker.debian.org/tracker/xen

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15565

Trust: 0.1

sources: VULMON: CVE-2020-11743 // JVNDB: JVNDB-2020-004781 // PACKETSTORM: 157721 // PACKETSTORM: 168871 // CNNVD: CNNVD-202004-657 // NVD: CVE-2020-11743

CREDITS

Gentoo

Trust: 0.7

sources: PACKETSTORM: 157721 // CNNVD: CNNVD-202004-657

SOURCES

db:CNVDid:CNVD-2020-25872
db:VULMONid:CVE-2020-11743
db:JVNDBid:JVNDB-2020-004781
db:PACKETSTORMid:157721
db:PACKETSTORMid:168871
db:CNNVDid:CNNVD-202004-657
db:NVDid:CVE-2020-11743

LAST UPDATE DATE

2024-08-14T12:12:54.408000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-25872date:2020-04-30T00:00:00
db:VULMONid:CVE-2020-11743date:2020-07-13T00:00:00
db:JVNDBid:JVNDB-2020-004781date:2020-05-27T00:00:00
db:CNNVDid:CNNVD-202004-657date:2022-09-21T00:00:00
db:NVDid:CVE-2020-11743date:2023-11-07T03:15:05.153

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-25872date:2020-04-30T00:00:00
db:VULMONid:CVE-2020-11743date:2020-04-14T00:00:00
db:JVNDBid:JVNDB-2020-004781date:2020-05-27T00:00:00
db:PACKETSTORMid:157721date:2020-05-15T14:52:42
db:PACKETSTORMid:168871date:2020-07-28T19:12:00
db:CNNVDid:CNNVD-202004-657date:2020-04-14T00:00:00
db:NVDid:CVE-2020-11743date:2020-04-14T13:15:12.970