CVE-2017-17564XEN vulnerability

CWE-3887 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.1%
top 80.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 12
Latest updateMay 14

Description

An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.

CVSS vector

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 1.1 | Impact: 6.0

Affected Packages3 packages

debiandebian/xen< xen 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 (bookworm)
Debianxen/xen< 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5+3
NVDxen/xen4.9.1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-32xh-h6c6-4hvr: An issue was discovered in Xen through 42022-05-14
OSV
CVE-2017-17564: An issue was discovered in Xen through 42017-12-12

📋Vendor Advisories

2
Red Hat
xen: improper x86 shadow mode refcount error handling (XSA-250)2017-12-12
Debian
CVE-2017-17564: xen - An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a ...2017

💬Community

2
Bugzilla
CVE-2017-17563 CVE-2017-17564 CVE-2017-17565 CVE-2017-17566 xen: various flaws [fedora-all]2017-12-12
Bugzilla
CVE-2017-17564 xsa250 xen: improper x86 shadow mode refcount error handling (XSA-250)2017-11-29