Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-6375 PoC — Xen ‘dma_pte_clear_one()’函数本地提权漏洞

Source
Associated Vulnerability
Title:Xen ‘dma_pte_clear_one()’函数本地提权漏洞 (CVE-2013-6375)
Description:Xen是英国剑桥大学开发的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。 Xen 4.2.1至4.3.1版本中存在提权漏洞。该漏洞源于程序在清除转换表条目之前没有正确刷新TLB缓存。本地攻击者可利用该漏洞造成拒绝服务或获取提升的权限。
Description
Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter."
File Snapshot

[4.0K] /data/pocs/2b0a22d33f2fb92ccd2432a1cba3a2d256d0ae29 0 directories, 0 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.