CVE-2017-17045Use After Free in XEN

CWE-416Use After Free6 documents6 sources
Severity
8.8HIGHNVD
EPSS
0.1%
top 78.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 28
Latest updateMay 13

Description

An issue was discovered in Xen through 4.9.x allowing HVM guest OS users to gain privileges on the host OS, obtain sensitive information, or cause a denial of service (BUG and host OS crash) by leveraging the mishandling of Populate on Demand (PoD) Physical-to-Machine (P2M) errors.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0

Affected Packages3 packages

debiandebian/xen< xen 4.8.2+xsa245-0+deb9u1 (bookworm)
Debianxen/xen< 4.8.2+xsa245-0+deb9u1+3
NVDxen/xen4.9.1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-33cr-5mgj-3gg9: An issue was discovered in Xen through 42022-05-13
OSV
CVE-2017-17045: An issue was discovered in Xen through 42017-11-28

📋Vendor Advisories

2
Red Hat
xen: Missing p2m error checking in PoD code (XSA-247)2017-11-28
Debian
CVE-2017-17045: xen - An issue was discovered in Xen through 4.9.x allowing HVM guest OS users to gain...2017

💬Community

1
Bugzilla
CVE-2017-17045 xsa247 xen: Missing p2m error checking in PoD code (XSA-247)2017-11-15