Unrated severityNVD Advisory· Published Aug 12, 2011· Updated Apr 29, 2026
CVE-2011-1898
CVE-2011-1898
Description
Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
Affected products
3cpe:2.3:a:citrix:xen:4.0.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:citrix:xen:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xen:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xen:4.1.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- xen.org/download/index_4.0.2.htmlnvdPatch
- www.invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdfnvdExploit
- lists.fedoraproject.org/pipermail/package-announce/2011-June/062112.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2011-June/062139.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2011-08/msg00017.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2011-08/msg00018.htmlnvd
- theinvisiblethings.blogspot.com/2011/05/following-white-rabbit-software-attacks.htmlnvd
- xen.1045712.n5.nabble.com/Xen-security-advisory-CVE-2011-1898-VT-d-PCI-passthrough-MSI-td4390298.htmlnvd
News mentions
0No linked articles in our index yet.