CVE-2017-10917NULL Pointer Dereference in XEN

Severity
9.1CRITICALNVD
EPSS
0.8%
top 25.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 5
Latest updateMay 17

Description

Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages3 packages

debiandebian/xen< xen 4.8.1-1+deb9u3 (bookworm)
Debianxen/xen< 4.8.1-1+deb9u3+3
NVDxen/xen4.8.1

🔴Vulnerability Details

2
GHSA
GHSA-v32f-p355-m49p: Xen through 42022-05-17
OSV
CVE-2017-10917: Xen through 42017-07-05

📋Vendor Advisories

2
Red Hat
xen: NULL pointer deref in event channel poll (XSA-221)2017-06-20
Debian
CVE-2017-10917: xen - Xen through 4.8.x does not validate the port numbers of polled event channel por...2017

💬Community

2
Bugzilla
CVE-2017-10917 xen: xsa221 xen: NULL pointer deref in event channel poll (XSA-221) [fedora-all]2017-06-20
Bugzilla
CVE-2017-10917 xsa221 xen: NULL pointer deref in event channel poll (XSA-221)2017-06-05