Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
References
Link | Resource |
---|---|
http://xenbits.xen.org/xsa/advisory-186.html | Patch Vendor Advisory |
http://www.securitytracker.com/id/1036752 | VDB Entry Third Party Advisory |
http://support.citrix.com/article/CTX216071 | Third Party Advisory |
http://xenbits.xen.org/xsa/xsa186-0001-x86-emulate-Correct-boundary-interactions-of-emulate.patch | Patch Vendor Advisory |
http://www.securityfocus.com/bid/92865 | |
https://security.gentoo.org/glsa/201611-09 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-09-21 07:25
Updated : 2017-06-30 18:30
NVD link : CVE-2016-7093
Mitre link : CVE-2016-7093
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
xen
- xen