Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-9637

Опубликовано: 17 фев. 2017
Источник: nvd
CVSS3: 7.5
CVSS2: 3.7
EPSS Низкий

Описание

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*
cpe:2.3:a:citrix:xenserver:6.5:sp1:*:*:*:*:*:*
cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*

EPSS

Процентиль: 26%
0.00087
Низкий

7.5 High

CVSS3

3.7 Low

CVSS2

Дефекты

CWE-264

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.

CVSS3: 7.6
redhat
почти 9 лет назад

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.

CVSS3: 7.5
debian
больше 8 лет назад

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu i ...

CVSS3: 7.5
github
больше 3 лет назад

The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.

oracle-oval
больше 8 лет назад

ELSA-2016-2963: xen security update (IMPORTANT)

EPSS

Процентиль: 26%
0.00087
Низкий

7.5 High

CVSS3

3.7 Low

CVSS2

Дефекты

CWE-264