Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mp6j-2xjg-wm8g

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.

The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.

EPSS

Процентиль: 46%
0.00233
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.

redhat
больше 10 лет назад

The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.

nvd
больше 10 лет назад

The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.

debian
больше 10 лет назад

The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore s ...

oracle-oval
больше 9 лет назад

ELSA-2016-0450: kernel security update (IMPORTANT)

EPSS

Процентиль: 46%
0.00233
Низкий