MEDIUM · 6.0

CVE-2016-9385

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical addr...

Vulnerability Description

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.

CVSS Score

6.0

MEDIUM

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
XenXen4.4.0
CitrixXenserver6.0.2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-9385?

CVE-2016-9385 is a vulnerability with a CVSS score of 6.0 (MEDIUM). The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical addr...

How severe is CVE-2016-9385?

CVE-2016-9385 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-9385?

Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Citrix Xenserver.