Page 38 of 393 results (0.006 seconds)

CVSS: 6.0EPSS: 0%CPEs: 20EXPL: 0

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks. La funcionalidad de emulación de escritura de base de segmento x86 en Xen 4.4.x hasta la versión 4.7.x permite a administradores locales del SO invitado x86 PV provocar una denegación de servicio (caída del host) aprovechando la falta de verificación de direcciones canónicas. • http://www.securityfocus.com/bid/94472 http://www.securitytracker.com/id/1037342 http://xenbits.xen.org/xsa/advisory-193.html https://security.gentoo.org/glsa/201612-56 https://support.citrix.com/article/CTX218775 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving an asynchronous abort while at EL2. Xen hasta la versión 4.7.x permite a usuarios locales del SO ARM invitado provocar una denegación de servicio (caída del host) a través de vectores que implican un aborto asíncrono mientra en EL2. • http://www.openwall.com/lists/oss-security/2016/11/29/3 http://www.openwall.com/lists/oss-security/2016/12/05/7 http://www.securityfocus.com/bid/94581 http://www.securitytracker.com/id/1037358 http://xenbits.xen.org/xsa/advisory-201.html http://xenbits.xen.org/xsa/xsa201-2.patch https://security.gentoo.org/glsa/201612-56 • CWE-284: Improper Access Control •

CVSS: 3.3EPSS: 0%CPEs: 45EXPL: 0

CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix. Emulación CMPXCHG8B en Xen 3.3.x hasta la versión 4.7.x en sistemas x86 permite a usuarios locales HVM invitados del SO obtener información sensible de la memoria basada en pila del anfitrión a través de un prefijo de tamaño de operando "supuestamente ignorado". • http://www.debian.org/security/2017/dsa-3847 http://www.securityfocus.com/bid/94863 http://www.securitytracker.com/id/1037468 http://xenbits.xen.org/xsa/advisory-200.html https://security.gentoo.org/glsa/201612-56 https://support.citrix.com/article/CTX219378 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table. Xen 4.7 permite a usuarios locales de SO huésped obtener información sensible del host cargando una tabla de símbolos 32-bit ELF. • http://www.securityfocus.com/bid/94468 http://www.securitytracker.com/id/1037343 http://xenbits.xen.org/xsa/advisory-194.html http://xenbits.xen.org/xsa/xsa194.patch https://security.gentoo.org/glsa/201612-56 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 0

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it. Xen 4.7.x y versiones anteriores no respeta adecuadamente CR0.TS y CR0.EM, lo que permite a usuarios locales x86 HVM del SO invitado leer o modificar información del estado de registro FPU, MMX o XMM que pertenece a tareas arbitrarias en el invitado modificando una instrucción mientras que el hipervisor se prepara para emularlo. • http://www.securityfocus.com/bid/93344 http://www.securitytracker.com/id/1036942 http://xenbits.xen.org/xsa/advisory-190.html https://security.gentoo.org/glsa/201611-09 https://support.citrix.com/article/CTX217363 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •