6.3
CVSSv3

CVE-2016-1571

Published: 22/01/2016 Updated: 30/10/2018
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 6.3 | Impact Score: 4 | Exploitability Score: 1.8
VMScore: 418
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x up to and including 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.

Vulnerable Product Search on Vulmon Subscribe to Product

citrix xenserver

xen xen 3.4.1

xen xen 3.4.0

xen xen 4.5.0

xen xen 4.4.3

xen xen 4.3.3

xen xen 4.3.2

xen xen 4.2.0

xen xen 4.1.6.1

xen xen 4.1.0

xen xen 3.4.4

xen xen 3.4.3

xen xen 3.4.2

xen xen 4.5.2

xen xen 4.5.1

xen xen 4.3.4

xen xen 4.2.3

xen xen 4.2.2

xen xen 4.2.1

xen xen 4.1.2

xen xen 4.1.1

xen xen 3.3.2

xen xen 3.3.1

xen xen 4.4.2

xen xen 4.4.1

xen xen 4.3.1

xen xen 4.3.0

xen xen 4.1.6

xen xen 4.1.5

xen xen 3.3.0

xen xen 4.6.0

xen xen 4.4.0

xen xen 4.2.5

xen xen 4.2.4

xen xen 4.1.4

xen xen 4.1.3

Vendor Advisories

Debian Bug report logs - #823620 Multiple security issues Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 6 May 2016 18:03:02 UTC Severity: grave Tags: security Fixed in versions xen/480~rc3-1, xen/48 ...
Multiple security issues have been found in the Xen virtualisation solution, which may result in denial of service or information disclosure The oldstable distribution (wheezy) will be updated in a separate DSA For the stable distribution (jessie), these problems have been fixed in version 441-9+deb8u4 For the unstable distribution (sid), thes ...
The paging_invlpg function in include/asm-x86/pagingh in Xen 33x through 46x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check ...