Show filters
31 Total Results
Displaying 21-30 of 31
Sort by:
Attacker Value
Unknown

CVE-2016-9380

Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.
0
Attacker Value
Unknown

CVE-2016-9386

Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
0
Attacker Value
Unknown

CVE-2016-9381

Disclosure Date: January 23, 2017 (last updated November 25, 2024)
Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
Attacker Value
Unknown

CVE-2016-9379

Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.
0
Attacker Value
Unknown

CVE-2016-9382

Disclosure Date: January 23, 2017 (last updated November 25, 2024)
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
0
Attacker Value
Unknown

CVE-2016-9385

Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
0
Attacker Value
Unknown

CVE-2016-6258

Disclosure Date: August 02, 2016 (last updated November 25, 2024)
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
0
Attacker Value
Unknown

CVE-2016-6259

Disclosure Date: August 02, 2016 (last updated November 25, 2024)
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
0
Attacker Value
Unknown

CVE-2016-3712

Disclosure Date: May 11, 2016 (last updated November 25, 2024)
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
Attacker Value
Unknown

CVE-2016-3710

Disclosure Date: May 11, 2016 (last updated November 25, 2024)
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.