Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2017-15597
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a grant of a dying domain, the assumption turns out wrong. A malicious guest administrator can cause hypervisor memory corruption, most likely resulting in host crash and a Denial of Service. Privilege escalation and information leaks cannot be ruled out..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 9/10
- Exploit Score
- 8/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- Single
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
CVSSv3.1 Score
- Severity
- Critical
- Base Score
- 9.1/10
- Exploit Score
- 2.3/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- High
- Impact Score
- 6/10
- Confidentiality Impact
- High
- Availability Impact
- High
- Integrity Impact
- High
- Scope
- Changed
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:xen:xen:*:rc7:*:*:*:*:*:* |
Yes
|
- | - |
References
- https://support.citrix.com/article/CTX229057
- http://xenbits.xen.org/xsa/advisory-236.html
- http://www.openwall.com/lists/oss-security/2017/10/24/3
- http://www.securitytracker.com/id/1039653
- http://www.securityfocus.com/bid/101564
- https://www.debian.org/security/2017/dsa-4050
- https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html