CVE-2016-3159

LOW

Description

The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.

References

http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html

http://support.citrix.com/article/CTX209443

http://www.debian.org/security/2016/dsa-3554

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.securityfocus.com/bid/85716

http://www.securitytracker.com/id/1035435

http://xenbits.xen.org/xsa/advisory-172.html

http://xenbits.xen.org/xsa/xsa172.patch

Details

Source: MITRE

Published: 2016-04-13

Updated: 2019-02-21

Type: CWE-200

Risk Information

CVSS v2.0

Base Score: 1.7

Vector: AV:L/AC:L/Au:S/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.1

Severity: LOW

CVSS v3.0

Base Score: 3.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

Impact Score: 1.4

Exploitability Score: 2

Severity: LOW