CVE-2017-7995
SUSE Security Advisory - SUSE-SU-2017:1146-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.
Xen PV guest anterior a Xen 4.3 chequea los permisos de acceso a los rangos MMIO sólo después de acceder a ellos, lo que permite leer en un dispositivo de memoria PCI, dando lugar a la divulgación de información. Se trata de un error en la función get_user. NOTA: el upstream Xen Project considera versiones anteriores a 4.5.x para ser EOL.
An update that solves four vulnerabilities and has three fixes is now available. This update for xen fixes several security issues. Allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer. Hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions. A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-04-21 CVE Reserved
- 2017-05-02 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html | Third Party Advisory |
|
http://www.securityfocus.com/bid/98314 | Third Party Advisory | |
https://bugzilla.suse.com/show_bug.cgi?id=1033948 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | <= 4.2.5 Search vendor "Xen" for product "Xen" and version " <= 4.2.5" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Manager Search vendor "Suse" for product "Manager" | 2.1 Search vendor "Suse" for product "Manager" and version "2.1" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Manager Proxy Search vendor "Suse" for product "Manager Proxy" | 2.1 Search vendor "Suse" for product "Manager Proxy" and version "2.1" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Openstack Cloud Search vendor "Suse" for product "Openstack Cloud" | 5 Search vendor "Suse" for product "Openstack Cloud" and version "5" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Point Of Sale Search vendor "Novell" for product "Suse Linux Enterprise Point Of Sale" | 11.0 Search vendor "Novell" for product "Suse Linux Enterprise Point Of Sale" and version "11.0" | sp3 |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Server Search vendor "Novell" for product "Suse Linux Enterprise Server" | 11.0 Search vendor "Novell" for product "Suse Linux Enterprise Server" and version "11.0" | sp3, ltss |
Affected
|