Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2016-6258
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.2/10
- Exploit Score
- 3.9/10
- Access Vector
- Local
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
CVSSv3.1 Score
- Severity
- High
- Base Score
- 8.8/10
- Exploit Score
- 2/10
- Access Vector
- Local
- Access Complexity
- Low
- Privileges Required
- Low
- Impact Score
- 6/10
- Confidentiality Impact
- High
- Availability Impact
- High
- Integrity Impact
- High
- Scope
- Changed
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.securitytracker.com/id/1036446
- http://xenbits.xen.org/xsa/xsa182-4.6.patch
- http://xenbits.xen.org/xsa/xsa182-unstable.patch
- http://xenbits.xen.org/xsa/advisory-182.html
- http://www.securityfocus.com/bid/92131
- http://support.citrix.com/article/CTX214954
- http://xenbits.xen.org/xsa/xsa182-4.5.patch
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.debian.org/security/2016/dsa-3633
- https://security.gentoo.org/glsa/201611-09