Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
References
Link | Resource |
---|---|
http://support.citrix.com/article/CTX216071 | Third Party Advisory |
http://www.securityfocus.com/bid/92865 | |
http://www.securitytracker.com/id/1036752 | VDB Entry Third Party Advisory |
http://xenbits.xen.org/xsa/advisory-186.html | Patch Vendor Advisory |
http://xenbits.xen.org/xsa/xsa186-0001-x86-emulate-Correct-boundary-interactions-of-emulate.patch | Patch Vendor Advisory |
https://security.gentoo.org/glsa/201611-09 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2016-09-21 14:25
Updated : 2017-07-01 01:30
NVD link : CVE-2016-7093
Mitre link : CVE-2016-7093
CVE.ORG link : CVE-2016-7093
JSON object : View
Products Affected
xen
- xen
CWE
CWE-264
Permissions, Privileges, and Access Controls