4.1
CVSSv3

CVE-2016-7094

Published: 21/09/2016 Updated: 01/07/2017
CVSS v2 Base Score: 1.5 | Impact Score: 2.9 | Exploitability Score: 2.7
CVSS v3 Base Score: 4.1 | Impact Score: 3.6 | Exploitability Score: 0.5
VMScore: 134
Vector: AV:L/AC:M/Au:S/C:N/I:N/A:P

Vulnerability Summary

Buffer overflow in Xen 4.7.x and previous versions allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen

Vendor Advisories

Multiple vulnerabilities have been discovered in the Xen hypervisor The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-7092 (XSA-185) Jeremie Boutoille of Quarkslab and Shangcong Luan of Alibaba discovered a flaw in the handling of L3 pagetable entries, allowing a malicious 32-bit PV guest adm ...
Description of Problem A number of security vulnerabilities have been identified in Citrix XenServer that may allow malicious privileged code running within a guest VM to compromise the host These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 70 The following vulnerabilities have ...

Recent Articles

Hypervisor security ero-Xen: How guest VMs can hijack host servers
The Register • Chris Williams, Editor in Chief • 08 Sep 2016

Triple whammy of bugs in popular open-source platform

Analysis The Xen project has today patched four security bugs in its open-source hypervisor – three potentially allowing guest virtual machines to take over their host servers. The other programming cockup allows a guest to crash the underlying machine. This is not great news for cloud providers or anyone else running untrusted VMs on their hardware and relying on Xen, because the three holes can be exploited by malicious guests to escape their confines and attack other virtual machines or the...