SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Citrix XenServer Vendors:   Citrix
(Citrix Issues Fix for Citrix XenServer) Xen Bug in Cirrus Display Emulation Lets Local Users on a Guest System Gain Elevated Privileges on the Host System
SecurityTracker Alert ID:  1037915
SecurityTracker URL:  http://securitytracker.com/id/1037915
CVE Reference:   CVE-2017-2615   (Links to External Site)
Date:  Feb 28 2017
Impact:   Disclosure of system information, Disclosure of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.0.2, 6.2.0, 6.5, 7.0
Description:   A vulnerability was reported in Xen. A local administrative user on the guest system can obtain potentially sensitive information or gain elevated privileges on the host system. Citrix XenServer is affected.

A local administrative user on the guest system can trigger an out-of-bounds memory access error in qemu in the Cirrus display emulation code to obtain potentially sensitive information from system memory or potentially gain elevated privileges on the host system.

x86 systems with the qemu process running in dom0 and with HVM guests are affected.

ARM systems are not affected.

PV guests are not affected.

Impact:   A local administrative user on the guest system can obtain potentially sensitive information or gain elevated privileges on the host system.
Solution:   Citrix has issued a fix for CVE-2017-2615 for Citrix XenServer.

The Citrix advisory is available at:

https://support.citrix.com/article/CTX220771

Cause:   Access control error

Message History:   This archive entry is a follow-up to the message listed below.
Feb 10 2017 Xen Bug in Cirrus Display Emulation Lets Local Users on a Guest System Gain Elevated Privileges on the Host System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC