// For flags

CVE-2017-15597

 

Severity Score

9.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a grant of a dying domain, the assumption turns out wrong. A malicious guest administrator can cause hypervisor memory corruption, most likely resulting in host crash and a Denial of Service. Privilege escalation and information leaks cannot be ruled out.

Se ha descubierto un problema en Xen hasta las versiones 4.9.x. El código copiado por la función GRANT asumía que cualquier Grant Pin estaría acompañado de una referencia de página adecuada. Sin embargo, otras fragmentos de código no coincidieron con esta suposición. Cuando esta operación de copia de autorización se realiza en una tabla grant de un dominio obsoleto, la suposición se vuelve errónea. Un administrador invitado malicioso puede provocar la corrupción de la memoria del hipervisor, lo que probablemente resulte en el cierre inesperado del host y una denegación de servicio. El escalado de privilegios y las fugas de información no pueden descartarse.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-10-18 CVE Reserved
  • 2017-10-30 CVE Published
  • 2023-03-23 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
<= 4.9.0
Search vendor "Xen" for product "Xen" and version " <= 4.9.0"
rc7
Affected