First published: Mon Jan 23 2017(Updated: )
The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
XenServer | =6.0.2 | |
XenServer | =6.2.0 | |
XenServer | =6.5 | |
XenServer | =7.0 | |
Xen XAPI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9386 is classified as a high severity vulnerability due to potential privilege escalation risks.
To fix CVE-2016-9386, update your XenServer to the latest patched version as recommended by the vendor.
CVE-2016-9386 affects XenServer versions 6.0.2, 6.2.0, 6.5, and 7.0.
Yes, local HVM guest users can exploit CVE-2016-9386 to gain elevated privileges.
There are no known workarounds for CVE-2016-9386, and the recommended course of action is to apply the relevant security updates.