6.5
CVSSv3

CVE-2017-14318

Published: 12/09/2017 Updated: 30/11/2017
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.5 | Impact Score: 4 | Exploitability Score: 2
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

An issue exists in Xen 4.5.x up to and including 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table is checked to see if a grant mapping to the calling domain exists for the page in question. However, the function does not check to see if the owning domain actually has a grant table or not. Some special domains, such as `DOMID_XEN`, `DOMID_IO` and `DOMID_COW` are created without grant tables. Hence, if __gnttab_cache_flush operates on a page owned by these special domains, it will attempt to dereference a NULL pointer in the domain struct.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.5.0

xen xen 4.6.3

xen xen 4.6.4

xen xen 4.8.0

xen xen 4.8.1

xen xen 4.6.0

xen xen 4.6.1

xen xen 4.7.2

xen xen 4.7.3

xen xen 4.5.3

xen xen 4.5.5

xen xen 4.7.0

xen xen 4.7.1

xen xen 4.5.1

xen xen 4.5.2

xen xen 4.6.5

xen xen 4.6.6

xen xen 4.9.0

Vendor Advisories

An issue was discovered in Xen 45x through 49x The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations It checks to see if the calling domain is the owner of the page that is to be operated on If it is not, the owner's grant table is checked to see if a grant mapping to the calling domain exists for the page i ...
Description of Problem A number of security vulnerabilities have been identified in Citrix XenServer that may allow a malicious administrator of a guest VM to compromise the host These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 72 The following vulnerabilities have been addres ...