Vulnerability Description
VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | 4.6.0 |
| Citrix | Xenserver | 6.0.2 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/95026Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037518Third Party AdvisoryVDB Entry
- http://xenbits.xen.org/xsa/advisory-203.htmlPatchVendor Advisory
- https://support.citrix.com/article/CTX219378PatchThird Party Advisory
- http://www.securityfocus.com/bid/95026Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037518Third Party AdvisoryVDB Entry
- http://xenbits.xen.org/xsa/advisory-203.htmlPatchVendor Advisory
- https://support.citrix.com/article/CTX219378PatchThird Party Advisory
FAQ
What is CVE-2016-10025?
CVE-2016-10025 is a vulnerability with a CVSS score of 5.5 (MEDIUM). VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a...
How severe is CVE-2016-10025?
CVE-2016-10025 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10025?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Citrix Xenserver.