Vigil@nce - Xen: denial of service via VMX INVLPG
February 2016 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker in a guest system can use INVLPG/INVVPID of Xen, in
order to trigger a denial of service on the host system.
Impacted products: Fedora, Xen.
Severity: 1/4.
Creation date: 20/01/2016.
DESCRIPTION OF THE VULNERABILITY
The Xen product can be installed in HVM mode with Shadow Mode
Paging, on an Intel/Cyrix processor.
However, in this configuration, using INVVPID with a non-canonical
address generates a fatal error in paging_invlpg().
An attacker in a guest system can therefore use INVLPG/INVVPID of
Xen, in order to trigger a denial of service on the host system.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Xen-denial-of-service-via-VMX-INVLPG-18772