CVE-2017-15589
Gentoo Linux Security Advisory 201801-14
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.
Se ha descubierto un problema en Xen hasta las versiones 4.9.x que permite que usuarios invitados del sistema operativo x86 HMV obtengan información sensible del sistema operativo host (o un sistema operativo invitado arbitrario) debido a que las operaciones I/O interceptadas pueden provocar la escritura de datos de la memoria de pila del hipervisor no inicializado.
Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, information leaks, privilege escalation or the execution of arbitrary code.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-10-18 CVE Reserved
- 2017-10-18 CVE Published
- 2024-08-05 CVE Updated
- 2025-06-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/101496 | Third Party Advisory | |
http://www.securitytracker.com/id/1039568 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html | Mailing List |
|
https://support.citrix.com/article/CTX228867 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://xenbits.xen.org/xsa/advisory-239.html | 2018-10-19 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201801-14 | 2018-10-19 | |
https://www.debian.org/security/2017/dsa-4050 | 2018-10-19 |