CVE-2017-10916
Published Jul 5, 2017
Last updated 7 years ago
Overview
- Description
- The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90CCECD0-C0F9-45A8-8699-64428637EBCA" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0ED340C-6746-471E-9F2D-19D62D224B7A" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99BD7C4F-DE4C-4508-B20D-46A94B616C5B" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3374F1FB-70F9-4EBC-837B-0D42282E3E5F" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37DA3D28-EAE7-4EC9-977C-444A46CBD9C7" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B6F7CE9-C409-4D88-9A99-B21420633F45" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B814C381-4991-495A-B530-7543F977B346" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FE1F484-23B4-4CCC-AD23-6F8BDC312CE8" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBB7BAFE-9CB4-40D2-908C-55307728116F" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AD42E21-EA9E-41EB-AC7E-478CCEEEBA8D" }, { "criteria": "cpe:2.3:o:xen:xen:4.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FDFDDA0-51D2-4995-9B4D-48047C940FC5" }, { "criteria": "cpe:2.3:o:xen:xen:4.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4447FA6-EDE7-4915-8238-2EA4CE782E96" }, { "criteria": "cpe:2.3:o:xen:xen:4.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB6804DA-1A77-47BF-803A-30AC602F8A9B" } ], "operator": "OR" } ] } ]