Vigil@nce - Xen: denial of service via ARM VGIC
March 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker in a guest system can generate numerous errors on ARM
VGIC of Xen, in order to trigger a denial of service by filling
log files.
Impacted products: Unix (platform)
Severity: 1/4
Creation date: 25/02/2015
DESCRIPTION OF THE VULNERABILITY
The Xen product emulates the ARM GICv2 (Generic Interrupt
Controller) component.
However, there is no limit on the number of error messages logged
by GIC.
An attacker in a guest system can therefore generate numerous
errors on ARM VGIC of Xen, in order to trigger a denial of service
by filling log files.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Xen-denial-of-service-via-ARM-VGIC-16258