First published: Thu Jan 26 2017(Updated: )
VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | =4.6.0 | |
Xen XAPI | =4.6.1 | |
Xen XAPI | =4.6.3 | |
Xen XAPI | =4.6.4 | |
Xen XAPI | =4.7.0 | |
Xen XAPI | =4.7.1 | |
Xen XAPI | =4.8.0 | |
XenServer | =6.0.2 | |
XenServer | =6.2.0 | |
XenServer | =6.5 | |
XenServer | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10025 has a severity rating that indicates it can lead to a denial of service through a hypervisor crash.
To fix CVE-2016-10025, you should upgrade to a version of Xen that is not affected, such as Xen 4.8.1 or later.
CVE-2016-10025 affects Xen versions 4.6.x to 4.8.x on x86 systems using AMD virtualization extensions.
CVE-2016-10025 requires local access to the HVM guest OS, making it a local privilege escalation issue rather than a remote exploit.
The impact of CVE-2016-10025 is a denial of service, causing the hypervisor to crash.