CVE-2017-10912
Gentoo Linux Security Advisory 201710-17
Severity Score
10.0
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217.
Xen, hasta las versiones 4.8.x, gestiona de manera incorrecta la transferencia de páginas, lo que permite que los usuarios invitados del sistema operativo obtengan acceso privilegiado al sistema operativo. Esto también se conoce como XSA-217.
Multiple vulnerabilities have been found in Xen, the worst of which may allow local attackers to escalate privileges. Versions less than 4.7.3 are affected.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2017-07-04 CVE Reserved
- 2017-07-05 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/99158 | Vdb Entry | |
http://www.securitytracker.com/id/1038721 | Vdb Entry | |
https://xenbits.xen.org/xsa/advisory-217.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2017/dsa-3969 | 2019-10-03 | |
https://security.gentoo.org/glsa/201708-03 | 2019-10-03 | |
https://security.gentoo.org/glsa/201710-17 | 2019-10-03 |