First published: Mon Jan 23 2017(Updated: )
Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | ||
XenServer | =6.0.2 | |
XenServer | =6.2.0 | |
XenServer | =6.5 | |
XenServer | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9383 has a high severity rating due to its potential to allow local x86 guest OS users to execute arbitrary code on the host.
To fix CVE-2016-9383, you should upgrade to a patched version of Xen or Citrix XenServer that addresses this vulnerability.
CVE-2016-9383 affects Xen and multiple versions of Citrix XenServer, including 6.0.2, 6.2.0, 6.5, and 7.0.
The impacts of CVE-2016-9383 include the ability to modify arbitrary memory, loss of sensitive information, denial of service, or execution of arbitrary code on the host.
The vendor for CVE-2016-9383 is Citrix, which develops XenServer and related technologies.