First published: Mon Jan 23 2017(Updated: )
The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | ||
XenServer | =6.0.2 | |
XenServer | =6.2.0 | |
XenServer | =6.5 | |
XenServer | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9380 is rated as a medium severity vulnerability.
To fix CVE-2016-9380, apply the recommended patches provided by the Xen Project or Citrix.
CVE-2016-9380 affects several versions of Xen, including all versions prior to the security patches released for this vulnerability.
CVE-2016-9380 requires local access to the affected system, so it cannot be exploited remotely.
Using CVE-2016-9380, an attacker could read or delete arbitrary files on the host via crafted bootloader configuration files.