Vulnerability Description
Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.
CVSS Score
6.5
MEDIUM
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | 4.7.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/94468Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037343
- http://xenbits.xen.org/xsa/advisory-194.htmlPatchVendor Advisory
- http://xenbits.xen.org/xsa/xsa194.patchPatchVendor Advisory
- https://security.gentoo.org/glsa/201612-56
- http://www.securityfocus.com/bid/94468Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037343
- http://xenbits.xen.org/xsa/advisory-194.htmlPatchVendor Advisory
- http://xenbits.xen.org/xsa/xsa194.patchPatchVendor Advisory
- https://security.gentoo.org/glsa/201612-56
FAQ
What is CVE-2016-9384?
CVE-2016-9384 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.
How severe is CVE-2016-9384?
CVE-2016-9384 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-9384?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.