Vulnerability Description
Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | 4.8.0 |
References
- http://www.securityfocus.com/bid/98426
- http://www.securitytracker.com/id/1038386
- https://blog.xenproject.org/2017/05/02/updates-on-xsa-213-xsa-214-and-xsa-215/Vendor Advisory
- https://security.gentoo.org/glsa/201705-11
- https://xenbits.xen.org/xsa/advisory-213.htmlMitigationPatchVendor Advisory
- http://www.securityfocus.com/bid/98426
- http://www.securitytracker.com/id/1038386
- https://blog.xenproject.org/2017/05/02/updates-on-xsa-213-xsa-214-and-xsa-215/Vendor Advisory
- https://security.gentoo.org/glsa/201705-11
- https://xenbits.xen.org/xsa/advisory-213.htmlMitigationPatchVendor Advisory
FAQ
What is CVE-2017-8903?
CVE-2017-8903 is a vulnerability with a CVSS score of 8.8 (HIGH). Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.
How severe is CVE-2017-8903?
CVE-2017-8903 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-8903?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.