Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Local
0

CVE-2016-6259

Disclosure Date: August 02, 2016
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
6.2 Medium
Impact Score:
3.6
Exploitability Score:
2.5
Vector:
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High

General Information

Vendors

  • citrix,
  • xen

Products

  • xen 4.5.0,
  • xen 4.5.1,
  • xen 4.5.2,
  • xen 4.5.3,
  • xen 4.6.0,
  • xen 4.6.1,
  • xen 4.6.3,
  • xen 4.7.0,
  • xenserver 6.0,
  • xenserver 6.0.2,
  • xenserver 6.1,
  • xenserver 6.2.0,
  • xenserver 6.5.0,
  • xenserver 7.0
Technical Analysis