Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-8903

Опубликовано: 11 мая 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2
CVSS3: 8.8

Описание

Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.

РелизСтатусПримечание
devel

released

4.9.0-0ubuntu2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.11]]
esm-infra/xenial

released

4.6.5-0ubuntu1.1
precise/esm

DNE

trusty

released

4.4.2-0ubuntu0.14.04.11
trusty/esm

DNE

trusty was released [4.4.2-0ubuntu0.14.04.11]
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

released

4.6.5-0ubuntu1.1

Показывать по

EPSS

Процентиль: 56%
0.00338
Низкий

7.2 High

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.5
redhat
почти 9 лет назад

Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.

CVSS3: 8.8
nvd
больше 8 лет назад

Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.

CVSS3: 8.8
debian
больше 8 лет назад

Xen through 4.8.x on 64-bit platforms mishandles page tables after an ...

CVSS3: 8.8
github
больше 3 лет назад

Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.

fstec
больше 8 лет назад

Уязвимость гипервизора Xen, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 56%
0.00338
Низкий

7.2 High

CVSS2

8.8 High

CVSS3