CVE-2017-15597
An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a grant of a dying domain, the assumption turns out wrong. A malicious guest administrator can cause hypervisor memory corruption, most likely resulting in host crash and a Denial of Service. Privilege escalation and information leaks cannot be ruled out.
Published
2017-10-30T14:29:00.847
Last Modified
2025-04-20T01:37:25.860
Status
Deferred
Source
[email protected]
Severity
CVSSv3.0: 9.1 (CRITICAL)
CVSSv2 Vector
AV:N/AC:L/Au:S/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: SINGLE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.0
Impact Score
10.0
Weaknesses
-
Type: Primary
CWE-119
CWE-200
Affected Vendors & Products
| Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
| Operating System |
xen
|
xen
|
≤ 4.9.0 |
Yes
|
References
-
http://www.openwall.com/lists/oss-security/2017/10/24/3
Issue Tracking, Mailing List, Mitigation, Third Party Advisory
([email protected])
-
http://www.securityfocus.com/bid/101564
Issue Tracking, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1039653
Issue Tracking, Third Party Advisory, VDB Entry
([email protected])
-
http://xenbits.xen.org/xsa/advisory-236.html
Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
([email protected])
-
https://support.citrix.com/article/CTX229057
Issue Tracking, Third Party Advisory
([email protected])
-
https://www.debian.org/security/2017/dsa-4050
([email protected])
-
http://www.openwall.com/lists/oss-security/2017/10/24/3
Issue Tracking, Mailing List, Mitigation, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/101564
Issue Tracking, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1039653
Issue Tracking, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://xenbits.xen.org/xsa/advisory-236.html
Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.citrix.com/article/CTX229057
Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2017/dsa-4050
(af854a3a-2127-422b-91ae-364da2661108)