CVE-2017-10920
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The grant-table feature in Xen through 4.8.x mishandles a GNTMAP_device_map and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka XSA-224 bug 1.
La característica de tabla grant en Xen, hasta las versiones 4.8.x, gestiona de manera incorrecta un mapeo de GNTMAP_device_map y GNTMAP_host_map cuando este va seguido únicamente de una desasignación (unmapping) de GNTMAP_host_map, lo que permite que los usuarios invitados del sistema operativo provoquen una denegación de servicio (mala gestión del conteo y corrupción de memoria) u obtengan privilegios de acceso al sistema operativo anfitrión. Esto también se conoce como XSA-224, fallo 1.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-07-04 CVE Reserved
- 2017-07-05 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.securitytracker.com/id/1038734 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://xenbits.xen.org/xsa/advisory-224.html | 2019-10-03 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2017/dsa-3969 | 2019-10-03 | |
https://security.gentoo.org/glsa/201708-03 | 2019-10-03 | |
https://security.gentoo.org/glsa/201710-17 | 2019-10-03 |