Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-15597
HistoryOct 30, 2017 - 12:00 a.m.

CVE-2017-15597

2017-10-3000:00:00
ubuntu.com
ubuntu.com
10

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

61.3%

An issue was discovered in Xen through 4.9.x. Grant copying code made an
implication that any grant pin would be accompanied by a suitable page
reference. Other portions of code, however, did not match up with that
assumption. When such a grant copy operation is being done on a grant of a
dying domain, the assumption turns out wrong. A malicious guest
administrator can cause hypervisor memory corruption, most likely resulting
in host crash and a Denial of Service. Privilege escalation and information
leaks cannot be ruled out.

Notes

Author Note
mdeslaur hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchxen< 4.9.2-0ubuntu1UNKNOWN
ubuntu16.04noarchxen< anyUNKNOWN

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

61.3%