[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2017-10916Date: (C)2017-07-06   (M)2024-01-04


The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score : 5.0
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
SECTRACK-1038730
BID-99167
DSA-3969
GLSA-201708-03
https://xenbits.xen.org/xsa/advisory-220.html

CPE    4
cpe:/o:xen:xen:4.5.0
cpe:/o:xen:xen:4.5.2
cpe:/o:xen:xen:4.5.1
cpe:/o:xen:xen:4.6.0
...
CWE    1
CWE-200
OVAL    7
oval:org.secpod.oval:def:53135
oval:org.secpod.oval:def:603098
oval:org.secpod.oval:def:112592
oval:org.secpod.oval:def:1800095
...

© SecPod Technologies