Multiple vulnerabilities in Xen



Risk Low
Patch available YES
Number of vulnerabilities 7
CVE-ID CVE-2017-15588
CVE-2017-15589
CVE-2017-15594
CVE-2017-15592
CVE-2017-15591
CVE-2017-15593
CVE-2017-15590
CWE-ID CWE-362
CWE-200
CWE-264
CWE-119
CWE-20
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
Xen
Server applications / Virtualization software

Vendor Xen Project

Security Bulletin

This security bulletin contains information about 7 vulnerabilities.

1) Race condition

EUVDB-ID: #VU8829

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15588

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to gain unauthorized access to system memory.

The weakness exists on x86 PV guest systems due to improper handling of references in memory tables. An adjacent attacker can trigger a race condition while sending a translation lookaside buffer (TLB) flush request that involves an interprocessor interrupt (IPI) to a CPU, access all the system memory and possibly cause the system to crash.

Successful exploitation of the vulnerability may result in denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Xen: 4.5.0 - 4.9.0

CPE2.3 External links

http://xenbits.xen.org/xsa/advisory-241.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

EUVDB-ID: #VU8830

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15589

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to obtain potentially sensitive information.

The weakness exists in the I/O intercept code on x86 HVM systems due to improper security restrictions during I/O operations. During I/O operations, a write path where data is stored in an internal structure could contain bits from an uninitialized Hypervisor stack slot that allows adjacent attacker to access arbitrary data.

Successful exploitation of the vulnerability may result in further attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Xen: 4.5.0 - 4.9.0

CPE2.3 External links

http://xenbits.xen.org/xsa/advisory-239.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Privilege escalation

EUVDB-ID: #VU8831

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15594

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to gain elevated privileges on the target system.

The weakness exists in x86 PV guest systems using SVM due to improper handling of Interrupt Descriptor Table (IDT) settings when a new CPU is hot-plugged and brought online. An adjacent attacker can gain elevated privileges and possibly cause the system to crash.

Successful exploitation of the vulnerability may result in denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Xen: 4.5.0 - 4.9.0

CPE2.3 External links

http://xenbits.xen.org/xsa/advisory-244.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Memory corruption

EUVDB-ID: #VU8832

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15592

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The weakness exists in HVM guest systems due to insufficient memory processing. An adjacent attacker can trigger memory corruption and cause the system to crash.

Successful exploitation of the vulnerability may result in denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Xen: 4.5.0 - 4.9.0

CPE2.3 External links

http://xenbits.xen.org/xsa/advisory-243.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper input validation

EUVDB-ID: #VU8833

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15591

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The weakness exists in x86 systems due to improper request processing. An adjacent attacker can use a domain that controls a guest system and cause the system to crash.

Successful exploitation of the vulnerability may result in denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Xen: 4.5.0 - 4.9.0

CPE2.3 External links

http://xenbits.xen.org/xsa/advisory-238.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Memory corruption

EUVDB-ID: #VU8834

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15593

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The weakness exists in x86 PV guest systems due to insufficient memory processing. An adjacent attacker can trigger excessive memory consumption and cause the system to crash.

Successful exploitation of the vulnerability may result in denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Xen: 4.5.0 - 4.9.0

CPE2.3 External links

http://xenbits.xen.org/xsa/advisory-242.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Denial of service

EUVDB-ID: #VU8835

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15590

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The weakness exists in x86 systems due to multiple mapping issues in the setup of Peripheral Component Interconnect (PCI) Message Signaled Interrupts (MSI). An adjacent attacker can and cause the system to crash.

Successful exploitation of the vulnerability may result in denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Xen: 4.5.0 - 4.9.0

CPE2.3 External links

http://xenbits.xen.org/xsa/advisory-237.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###