CVE-2017-10916

MEDIUM

Description

The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

References

http://www.debian.org/security/2017/dsa-3969

http://www.securityfocus.com/bid/99167

http://www.securitytracker.com/id/1038730

https://security.gentoo.org/glsa/201708-03

https://xenbits.xen.org/xsa/advisory-220.html

Details

Source: MITRE

Published: 2017-07-05

Updated: 2017-11-04

Type: CWE-200

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH