First published: Tue Dec 12 2017(Updated: )
An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | <=4.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17563 has a medium severity level due to its potential for denial of service and privilege escalation.
To fix CVE-2017-17563, users should upgrade to a fixed version of Xen, specifically those versions higher than 4.9.1.
The potential impacts of CVE-2017-17563 include denial of service resulting in host OS crashes and the ability for guest OS users to gain host OS privileges.
Xen versions 4.9.x and lower are affected by CVE-2017-17563.
CVE-2017-17563 is primarily a local exploit, meaning it requires access to the guest OS to exploit the vulnerability.