Denial of Service Vulnerability in Xen with VMX Virtualization Extension

Denial of Service Vulnerability in Xen with VMX Virtualization Extension

CVE-2011-1936 · MEDIUM Severity

AV:A/AC:H/AU:N/C:N/I:N/A:C

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

Learn more about our User Device Pen Test.