Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2016-9603 |
A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. Published: July 27, 2018; 5:29:00 PM -0400 |
V3.0: 9.9 CRITICAL V2.0: 9.0 HIGH |
CVE-2017-2620 |
Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. Published: July 27, 2018; 3:29:00 PM -0400 |
V3.0: 9.9 CRITICAL V2.0: 9.0 HIGH |
CVE-2017-2615 |
Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host. Published: July 02, 2018; 9:29:00 PM -0400 |
V3.0: 9.1 CRITICAL V2.0: 9.0 HIGH |
CVE-2016-9637 |
The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access. Published: February 16, 2017; 9:59:13 PM -0500 |
V3.0: 7.5 HIGH V2.0: 3.7 LOW |
CVE-2016-6259 |
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check. Published: August 02, 2016; 12:59:09 PM -0400 |
V3.0: 6.2 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2016-6258 |
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries. Published: August 02, 2016; 12:59:08 PM -0400 |
V3.0: 8.8 HIGH V2.0: 7.2 HIGH |
CVE-2016-1571 |
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check. Published: January 22, 2016; 10:59:06 AM -0500 |
V3.0: 6.3 MEDIUM V2.0: 4.7 MEDIUM |
CVE-2014-4948 |
Unspecified vulnerability in Citrix XenServer 6.2 Service Pack 1 and earlier allows attackers to cause a denial of service and obtain sensitive information by modifying the guest virtual hard disk (VHD). Published: July 22, 2014; 4:55:02 PM -0400 |
V3.x:(not available) V2.0: 6.4 MEDIUM |
CVE-2014-4947 |
Buffer overflow in the HVM graphics console support in Citrix XenServer 6.2 Service Pack 1 and earlier has unspecified impact and attack vectors. Published: July 22, 2014; 4:55:02 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |