CVE-2017-14316

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the function checks to see if the special constant `NUMA_NO_NODE` is specified, it otherwise does not handle the case where `node >= MAX_NUMNODES`. This allows an out-of-bounds access to an internal array.

References

http://www.securityfocus.com/bid/100818

http://www.securitytracker.com/id/1039348

http://xenbits.xen.org/xsa/advisory-231.html

https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html

https://support.citrix.com/article/CTX227185

https://www.debian.org/security/2017/dsa-4050

Details

Source: MITRE

Published: 2017-09-12

Updated: 2018-10-19

Type: CWE-125

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Impact Score: 6

Exploitability Score: 2

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* versions up to 4.9.0 (inclusive)

Tenable Plugins

View all (20 total)

IDNameProductFamilySeverity
140019OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
118215Debian DLA-1549-1 : xen security updateNessusDebian Local Security Checks
critical
111992OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
105848Fedora 27 : xen (2017-333ea49a63)NessusFedora Local Security Checks
high
104819Debian DSA-4050-1 : xen - security updateNessusDebian Local Security Checks
critical
104136OracleVM 3.4 : xen (OVMSA-2017-0157)NessusOracleVM Local Security Checks
high
103830OracleVM 3.4 : xen (OVMSA-2017-0153)NessusOracleVM Local Security Checks
critical
103791Debian DLA-1132-1 : xen security updateNessusDebian Local Security Checks
critical
103636SUSE SLES11 Security Update : xen (SUSE-SU-2017:2611-1)NessusSuSE Local Security Checks
high
103619Fedora 25 : xen (2017-f7fd3fe7eb)NessusFedora Local Security Checks
high
103412SUSE SLES12 Security Update : xen (SUSE-SU-2017:2541-1)NessusSuSE Local Security Checks
high
103396openSUSE Security Update : xen (openSUSE-2017-1080)NessusSuSE Local Security Checks
high
103381Citrix XenServer Multiple Vulnerabilities (CTX227185)NessusMisc.
high
103328Xen Hypervisor Multiple Vulnerabilities (XSA-231 - XSA-234)NessusMisc.
high
103315SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2017:2519-1)NessusSuSE Local Security Checks
high
103291openSUSE Security Update : xen (openSUSE-2017-1071)NessusSuSE Local Security Checks
high
103267Fedora 26 : xen (2017-e399a9008c)NessusFedora Local Security Checks
high
103246SUSE SLES12 Security Update : xen (SUSE-SU-2017:2466-1)NessusSuSE Local Security Checks
high
103216SUSE SLES11 Security Update : xen (SUSE-SU-2017:2450-1)NessusSuSE Local Security Checks
high
103177SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2017:2420-1)NessusSuSE Local Security Checks
high