Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
References
Link | Resource |
---|---|
http://support.citrix.com/article/CTX216071 | Third Party Advisory |
http://www.securityfocus.com/bid/92865 | |
http://www.securitytracker.com/id/1036752 | VDB Entry Third Party Advisory |
http://xenbits.xen.org/xsa/advisory-186.html | Patch Vendor Advisory |
http://xenbits.xen.org/xsa/xsa186-0001-x86-emulate-Correct-boundary-interactions-of-emulate.patch | Patch Vendor Advisory |
https://security.gentoo.org/glsa/201611-09 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2016-09-21T14:00:00
Updated: 2017-06-30T16:57:01
Reserved: 2016-08-25T00:00:00
Link: CVE-2016-7093
JSON object: View
NVD Information
Status : Modified
Published: 2016-09-21T14:25:24.097
Modified: 2017-07-01T01:30:04.890
Link: CVE-2016-7093
JSON object: View
Redhat Information
No data.
CWE