Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2017-10919 |
Xen through 4.8.x mishandles virtual interrupt injection, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-223. Published: July 04, 2017; 9:29:00 PM -0400 |
V3.0: 6.5 MEDIUM V2.0: 5.0 MEDIUM |
CVE-2017-10918 |
Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222. Published: July 04, 2017; 9:29:00 PM -0400 |
V3.0: 10.0 CRITICAL V2.0: 10.0 HIGH |
CVE-2017-10917 |
Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221. Published: July 04, 2017; 9:29:00 PM -0400 |
V3.0: 9.1 CRITICAL V2.0: 9.4 HIGH |
CVE-2017-10916 |
The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220. Published: July 04, 2017; 9:29:00 PM -0400 |
V3.0: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2017-10915 |
The shadow-paging feature in Xen through 4.8.x mismanages page references and consequently introduces a race condition, which allows guest OS users to obtain Xen privileges, aka XSA-219. Published: July 04, 2017; 9:29:00 PM -0400 |
V3.0: 9.0 CRITICAL V2.0: 6.8 MEDIUM |
CVE-2017-10914 |
The grant-table feature in Xen through 4.8.x has a race condition leading to a double free, which allows guest OS users to cause a denial of service (memory consumption), or possibly obtain sensitive information or gain privileges, aka XSA-218 bug 2. Published: July 04, 2017; 9:29:00 PM -0400 |
V3.0: 8.1 HIGH V2.0: 6.8 MEDIUM |
CVE-2017-10913 |
The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1. Published: July 04, 2017; 9:29:00 PM -0400 |
V3.0: 9.8 CRITICAL V2.0: 7.5 HIGH |
CVE-2017-10912 |
Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217. Published: July 04, 2017; 9:29:00 PM -0400 |
V3.0: 10.0 CRITICAL V2.0: 10.0 HIGH |
CVE-2016-9378 |
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery. Published: February 22, 2017; 11:59:00 AM -0500 |
V3.0: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2016-9377 |
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation. Published: February 22, 2017; 11:59:00 AM -0500 |
V3.0: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2016-9932 |
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix. Published: January 26, 2017; 10:59:00 AM -0500 |
V3.0: 3.3 LOW V2.0: 2.1 LOW |
CVE-2016-10024 |
Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations. Published: January 26, 2017; 10:59:00 AM -0500 |
V3.0: 6.0 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2016-10013 |
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation. Published: January 26, 2017; 10:59:00 AM -0500 |
V3.0: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2016-9385 |
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks. Published: January 23, 2017; 4:59:02 PM -0500 |
V3.0: 6.0 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2016-9382 |
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. Published: January 23, 2017; 4:59:02 PM -0500 |
V3.0: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2016-7777 |
Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it. Published: October 07, 2016; 10:59:10 AM -0400 |
V3.0: 6.3 MEDIUM V2.0: 3.3 LOW |
CVE-2016-7094 |
Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update. Published: September 21, 2016; 10:25:25 AM -0400 |
V3.0: 4.1 MEDIUM V2.0: 1.5 LOW |
CVE-2016-4480 |
The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory. Published: May 18, 2016; 10:59:05 AM -0400 |
V3.0: 8.4 HIGH V2.0: 7.2 HIGH |
CVE-2015-8554 |
Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path." Published: April 14, 2016; 10:59:05 AM -0400 |
V3.0: 7.5 HIGH V2.0: 6.6 MEDIUM |
CVE-2016-2270 |
Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings. Published: February 19, 2016; 11:59:00 AM -0500 |
V3.0: 6.8 MEDIUM V2.0: 4.6 MEDIUM |