CVE-2016-5242

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The p2m_teardown function in arch/arm/p2m.c in Xen 4.4.x through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (NULL pointer dereference and host OS crash) by creating concurrent domains and holding references to them, related to VMID exhaustion.

References

http://www.debian.org/security/2016/dsa-3633

http://www.securityfocus.com/bid/91015

http://www.securitytracker.com/id/1036035

http://xenbits.xen.org/xsa/advisory-181.html

Details

Source: MITRE

Published: 2016-06-07

Updated: 2016-11-28

Risk Information

CVSS v2

Base Score: 4.7

Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.4

Severity: MEDIUM

CVSS v3

Base Score: 5.6

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H

Impact Score: 4

Exploitability Score: 1.1

Severity: MEDIUM

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
92614Debian DSA-3633-1 : xen - security update (Bunker Buster)NessusDebian Local Security Checks
high
92081Fedora 24 : xen (2016-389be30b95)NessusFedora Local Security Checks
medium
92059Fedora 23 : xen (2016-103752d2a9)NessusFedora Local Security Checks
high