CVE-2017-17563Improper Restriction of Operations within the Bounds of a Memory Buffer in XEN

Severity
7.8HIGHNVD
EPSS
0.1%
top 80.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 12
Latest updateMay 14

Description

An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.

CVSS vector

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 1.1 | Impact: 6.0

Affected Packages3 packages

debiandebian/xen< xen 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 (bookworm)
Debianxen/xen< 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5+3
NVDxen/xen4.9.1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6mhv-9623-3chf: An issue was discovered in Xen through 42022-05-14
OSV
CVE-2017-17563: An issue was discovered in Xen through 42017-12-12

📋Vendor Advisories

2
Red Hat
xen: broken x86 shadow mode refcount overflow check (XSA-249)2017-12-12
Debian
CVE-2017-17563: xen - An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a ...2017

💬Community

2
Bugzilla
CVE-2017-17563 CVE-2017-17564 CVE-2017-17565 CVE-2017-17566 xen: various flaws [fedora-all]2017-12-12
Bugzilla
CVE-2017-17563 xsa249 xen: broken x86 shadow mode refcount overflow check (XSA-249)2017-11-29