CVE-2016-7154
 
Severity Score
6.7
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Use-after-free vulnerability in the FIFO event channel code in Xen 4.4.x allows local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number.
Vulnerabilidad de uso después de liberación de memoria en el código de canal de evento FIFO en Xen 4.4.x permite a administradores locales del SO invitado provocar una denegación de servicio (caída de host) y posiblemente ejecutar código arbitrario u obtener información sensible a través de un número de marco invitado no válido.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2016-09-06 CVE Reserved
- 2016-09-21 CVE Published
- 2023-12-23 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://support.citrix.com/article/CTX216071 | Third Party Advisory | |
http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf | X_refsource_misc | |
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/92863 | Third Party Advisory | |
http://www.securitytracker.com/id/1036754 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://xenbits.xen.org/xsa/advisory-188.html | 2017-04-10 | |
http://xenbits.xen.org/xsa/xsa188.patch | 2017-04-10 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2016/dsa-3663 | 2017-04-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.4.0 Search vendor "Xen" for product "Xen" and version "4.4.0" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.4.1 Search vendor "Xen" for product "Xen" and version "4.4.1" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.4.2 Search vendor "Xen" for product "Xen" and version "4.4.2" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.4.3 Search vendor "Xen" for product "Xen" and version "4.4.3" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.4.4 Search vendor "Xen" for product "Xen" and version "4.4.4" | - |
Affected
|