Improper check or handling of exceptional conditions in xen (Alpine package)



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2015-5307
CWE-ID CWE-703
Exploitation vector Local network
Public exploit N/A
Vulnerable software
IBM Systems Director
Server applications / Other server solutions

xen (Alpine package)
Operating systems & Components / Operating system package or component

Vendor IBM Corporation
Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper check or handling of exceptional conditions

EUVDB-ID: #VU3355

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2015-5307

CWE-ID: CWE-703 - Improper Check or Handling of Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The weakness exists in the KVM subsystem due to many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c. An adjacent attacker can cause the service to crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Systems Director: 6.3.2.2

xen (Alpine package): 0.2 - 0.9

xen (Alpine package): 0.4

xen (Alpine package): 2.5.3 - 2.17.5ubuntu1

xen (Alpine package): 3.4.0-1

xen (Alpine package): 0.14-1 - 0.15-2

xen (Alpine package): 2014.1-3

xen (Alpine package): 24.0-0ubuntu1

xen (Alpine package): 0.5.2-0ubuntu1 - 1.2.5ubuntu1daily13.06.14-0ubuntu1

xen (Alpine package): 3.0-0ubuntu1

xen (Alpine package): 2.4.2-16 - 2.4.2-38

xen (Alpine package): 0.98-1

xen (Alpine package): 1.28ubuntu5 - 1.34

xen (Alpine package): 1:0.8.6-0ubuntu4 - 1:0.9.7.6-0ubuntu2

xen (Alpine package):

xen (Alpine package): before 4.4.2-r4

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=2b6e9288f839c1f3133b73dd3f7b91f06bcaa6dd
https://git.alpinelinux.org/aports/commit/?id=d48fe1751d8303757741f6e904adb066c8eb647c


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###