2.1
CVSSv2

CVE-2016-9932

Published: 26/01/2017 Updated: 04/11/2017
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

CMPXCHG8B emulation in Xen 3.3.x up to and including 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.7.0

xen xen 4.5.1

xen xen 4.4.2

xen xen 4.4.3

xen xen 4.3.4

xen xen 4.2.1

xen xen 4.5.2

xen xen 4.5.3

xen xen 4.4.4

xen xen 4.4.0

xen xen 4.2.2

xen xen 4.2.3

xen xen 4.1.4

xen xen 4.1.5

xen xen 4.0.4

xen xen 4.0.0

xen xen 3.3.1

xen xen 4.6.3

xen xen 4.5.0

xen xen 4.4.1

xen xen 4.3.2

xen xen 4.3.3

xen xen 4.2.0

xen xen 4.1.1

xen xen 3.4.1

xen xen 4.0.1

xen xen 3.4.4

xen xen 3.3.2

xen xen 4.1.2

xen xen 4.1.3

xen xen 4.0.2

xen xen 4.0.3

xen xen 3.4.0

xen xen 3.3.0

xen xen 4.5.5

xen xen 4.6.0

xen xen 4.3.0

xen xen 4.3.1

xen xen 4.2.4

xen xen 4.2.5

xen xen 4.1.6

xen xen 4.1.6.1

xen xen 4.1.0

xen xen 3.4.2

xen xen 3.4.3

Vendor Advisories

Jan Beulich and Jann Horn discovered multiple vulnerabilities in the Xen hypervisor, which may lead to privilege escalation, guest-to-host breakout, denial of service or information leaks In additional to the CVE identifiers listed above, this update also addresses the vulnerabilities announced as XSA-213, XSA-214 and XSA-215 For the stable distr ...
Debian Bug report logs - #845667 xen: CVE-2016-9384: guest 32-bit ELF symbol table load leaking host data Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 25 Nov 2016 18:45:07 UTC Severity: important T ...
Debian Bug report logs - #848081 xen: CVE-2016-9932: x86 CMPXCHG8B emulation fails to ignore operand size override Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 13 Dec 2016 21:03:02 UTC Severity: im ...
Debian Bug report logs - #848713 xen: CVE-2016-10013: x86: Mishandling of SYSCALL singlestep during emulation Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 19 Dec 2016 19:06:01 UTC Severity: importa ...
Debian Bug report logs - #861662 possible memory corruption via failsafe callback [XSA-215] Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Ian Jackson <ianjackson@eucitrixcom> Date: Tue, 2 May 2017 12:12:01 UTC Severity: important Tags: fixed-upst ...
Debian Bug report logs - #859560 xen: CVE-2017-7228: x86: broken check in memory_exchange() permits PV guest breakout (XSA-212) Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 4 Apr 2017 19:51:02 UTC ...
Debian Bug report logs - #861659 64bit PV guest breakout [XSA-213] Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Ian Jackson <ianjackson@eucitrixcom> Date: Tue, 2 May 2017 12:03:05 UTC Severity: important Tags: fixed-upstream, security, upstream ...
Debian Bug report logs - #861660 grant transfer allows PV guest to elevate privileges [XSA-214] Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Ian Jackson <ianjackson@eucitrixcom> Date: Tue, 2 May 2017 12:03:08 UTC Severity: important Tags: fixed- ...
Debian Bug report logs - #845669 xen: CVE-2016-9377 CVE-2016-9378: x86 software interrupt injection mis-handled Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 25 Nov 2016 18:54:01 UTC Severity: impor ...
CMPXCHG8B emulation in Xen 33x through 47x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix ...
Description of Problem Security vulnerabilities have been identified in Citrix XenServer that may allow malicious code running within a guest VM to read a small part of hypervisor memory and allow privileged-mode code running within a guest VM to hang or crash the host These vulnerabilities affect all currently supported versions of Citrix XenServ ...