Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-9385

Опубликовано: 22 нояб. 2016
Источник: redhat
CVSS3: 6.8
CVSS2: 6.3
EPSS Низкий

Описание

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xenNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1392929xen: x86 segment base write emulation lacking canonical address checks (XSA-193)

EPSS

Процентиль: 29%
0.00104
Низкий

6.8 Medium

CVSS3

6.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 6
ubuntu
около 9 лет назад

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.

CVSS3: 6
nvd
около 9 лет назад

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.

CVSS3: 6
debian
около 9 лет назад

The x86 segment base write emulation functionality in Xen 4.4.x throug ...

CVSS3: 6
github
больше 3 лет назад

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.

suse-cvrf
около 9 лет назад

Security update for xen

EPSS

Процентиль: 29%
0.00104
Низкий

6.8 Medium

CVSS3

6.3 Medium

CVSS2