3.7
CVSSv2

CVE-2016-9637

Published: 17/02/2017 Updated: 08/02/2018
CVSS v2 Base Score: 3.7 | Impact Score: 6.4 | Exploitability Score: 1.9
CVSS v3 Base Score: 7.5 | Impact Score: 6 | Exploitability Score: 0.8
VMScore: 329
Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.

Vulnerable Product Search on Vulmon Subscribe to Product

citrix xenserver 6.0.2

citrix xenserver 6.5

citrix xenserver 6.2.0

citrix xenserver 7.0

Vendor Advisories

Synopsis Important: xen security update Type/Severity Security Advisory: Important Topic An update for xen is now available for Red Hat Enterprise Linux 5Red Hat Product Security has rated this update as having a security impact ofImportant A Common Vulnerability Scoring System (CVSS) base score, which gi ...
Debian Bug report logs - #845667 xen: CVE-2016-9384: guest 32-bit ELF symbol table load leaking host data Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 25 Nov 2016 18:45:07 UTC Severity: important T ...
Debian Bug report logs - #848713 xen: CVE-2016-10013: x86: Mishandling of SYSCALL singlestep during emulation Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 19 Dec 2016 19:06:01 UTC Severity: importa ...
Debian Bug report logs - #845669 xen: CVE-2016-9377 CVE-2016-9378: x86 software interrupt injection mis-handled Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 25 Nov 2016 18:54:01 UTC Severity: impor ...
An out of bounds array access issue was found in the Xen virtual machine monitor, built with the QEMU ioport support It could occur while doing ioport read/write operations, if guest was to supply a 32bit address parameter A privileged guest user/process could use this flaw to potentially escalate their privileges on a host ...
Description of Problem A security vulnerability has been identified in Citrix XenServer that may allow malicious privileged-mode code running within an HVM guest VM to compromise the host This vulnerability affects all currently supported versions of Citrix XenServer up to and including Citrix XenServer 70 The following vulnerability has been ad ...