Intel VT-d chipset Local Privilege Escalation Vulnerability for multiple virtualization applications

Source: Internet
Author: User

Release date:
Updated on:

Affected Systems:
RedHat Fedora 15
RedHat Fedora 14
XenSource Xen
Qumranet KVM
Description:
--------------------------------------------------------------------------------
Bugtraq id: 48515
Cve id: CVE-2011-1898

Intel VT-d is Intel's virtual allocation technology. It expands the virtualization technology development blueprint by providing hardware assistance for virtualization solutions. VT-d not only continues to support Virtualization of IA-32 (VT-x) and Intel & reg; anteng & reg; processor (VT-I, it also provides new virtualization support for I/O devices.

Multiple virtualization applications, such as Intel VT-d, have the local permission Escalation Vulnerability. Local attackers can exploit this vulnerability to gain elevated permissions in the client operating system and then control the host operating system, it can also trigger a denial of service.

When interrupt re ing is not enabled in the chipset, the Intel VT-d chipset allows clients with PCI devices to generate MSI interruptions by writing interrupt injection registers using DMA. This can be exploited to inject traps and control hosts.

<* Source: Rafal Wojtczuk

Link: http://xen.1045712.n5.nabble.com/Xen-security-advisory-CVE-2011-1898-VT-d-PCI-passthrough-MSI-td4390298.html
*>

Suggestion:
--------------------------------------------------------------------------------
Vendor patch:

Qumranet
--------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:

Http://kvm.qumranet.com/kvmwiki/Front_Page

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.