SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen Grant Table Allocator Race Condition Lets Local Users on a Guest System Gain Elevated Privileges on the Host System
SecurityTracker Alert ID:  1039175
SecurityTracker URL:  http://securitytracker.com/id/1039175
CVE Reference:   CVE-2017-12136   (Links to External Site)
Date:  Aug 16 2017
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.6.x, 4.7.x, 4.8.x, 4.9.x
Description:   A vulnerability was reported in Xen. A local administrative user on the guest system can gain elevated privileges on the host system.

A local administrative user on the guest system can trigger a race condition in the grant table allocator maptrack entry list processing code to cause the host system to crash or to can gain elevated privileges on the host system.

Ian Jackson of Citrix reported this vulnerability.

Impact:   A local administrative user on the guest system can gain elevated privileges on the host system.
Solution:   The vendor has issued a fix (xsa228-4.8.patch and xsa228.patch).

The vendor advisory is available at:

https://xenbits.xen.org/xsa/advisory-228.html

Vendor URL:  xenbits.xen.org/xsa/advisory-228.html (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Aug 22 2017 (Citrix Issues Fix for Citrix XenServer) Xen Grant Table Allocator Race Condition Lets Local Users on a Guest System Gain Elevated Privileges on the Host System
Citrix has issued a fix for Citrix XenServer.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC