Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-10917

Опубликовано: 05 июл. 2017
Источник: debian
EPSS Низкий

Описание

Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.8.1-1+deb9u3package
xennot-affectedwheezypackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-221.html

EPSS

Процентиль: 74%
0.00839
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 8 лет назад

Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.

CVSS3: 8.5
redhat
больше 8 лет назад

Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.

CVSS3: 9.1
nvd
больше 8 лет назад

Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.

CVSS3: 9.1
github
больше 3 лет назад

Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.

fstec
больше 8 лет назад

Уязвимость гипервизора Xen, позволяющая нарушителю получить конфиденциальную информацию или вызвать отказ в обслуживании

EPSS

Процентиль: 74%
0.00839
Низкий