2.1
CVSSv2

CVE-2016-10025

Published: 26/01/2017 Updated: 27/01/2017
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

VMFUNC emulation in Xen 4.6.x up to and including 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.8.0

xen xen 4.6.1

xen xen 4.6.4

xen xen 4.7.0

xen xen 4.7.1

xen xen 4.6.0

xen xen 4.6.3

citrix xenserver 7.0

citrix xenserver 6.5

citrix xenserver 6.2.0

citrix xenserver 6.0.2

Vendor Advisories

Debian Bug report logs - #845667 xen: CVE-2016-9384: guest 32-bit ELF symbol table load leaking host data Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 25 Nov 2016 18:45:07 UTC Severity: important T ...
Debian Bug report logs - #848713 xen: CVE-2016-10013: x86: Mishandling of SYSCALL singlestep during emulation Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 19 Dec 2016 19:06:01 UTC Severity: importa ...
Debian Bug report logs - #845669 xen: CVE-2016-9377 CVE-2016-9378: x86 software interrupt injection mis-handled Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 25 Nov 2016 18:54:01 UTC Severity: impor ...
Description of Problem Security vulnerabilities have been identified in Citrix XenServer that may allow malicious code running within a guest VM to read a small part of hypervisor memory and allow privileged-mode code running within a guest VM to hang or crash the host These vulnerabilities affect all currently supported versions of Citrix XenServ ...