First published: Wed Sep 21 2016(Updated: )
Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.5.3 | |
Xen xen-unstable | =4.6.3 | |
Xen xen-unstable | =4.7.0 |
http://xenbits.xen.org/xsa/xsa186-0001-x86-emulate-Correct-boundary-interactions-of-emulate.patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7093 has a high severity rating due to the potential for local HVM guest OS administrators to gain host OS privileges.
To fix CVE-2016-7093, it is recommended to upgrade your Xen hypervisor to a version that is not affected by this vulnerability.
CVE-2016-7093 affects Xen versions 4.5.3, 4.6.3, and 4.7.0.
CVE-2016-7093 is a privilege escalation vulnerability caused by mishandling of instruction pointer truncation.
Local HVM guest OS administrators can exploit CVE-2016-7093 to overwrite hypervisor memory and gain elevated privileges.