SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen Multiple Flaws on x86 Systems Let Local Guest System Users Obtain Memory Contents and Potentially Sensitive Information, Deny Service on the Host System, and Gain Elevated Privileges on the Host System
SecurityTracker Alert ID:  1039568
SecurityTracker URL:  http://securitytracker.com/id/1039568
CVE Reference:   CVE-2017-15588, CVE-2017-15589, CVE-2017-15590, CVE-2017-15591, CVE-2017-15592, CVE-2017-15593, CVE-2017-15594, CVE-2017-15596   (Links to External Site)
Updated:  Dec 6 2017
Original Entry Date:  Oct 12 2017
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.5.x, 4.6.x, 4.7.x, 4.8.x, 4.9.x
Description:   Several vulnerabilities were reported in Xen. A local user on the guest system can cause denial of service conditions on the host system. A local user on the guest system can gain elevated privileges on the host system. A local user can obtain potentially sensitive information from system memory.

A local user on a guest system that has a physical device assigned can exploit several PCI MSI interrupt flaws on x86-based systems to cause the host system to crash [CVE-2017-15590]. Versions 3.3 and after are affected.

A local user on a domain that controls HVM guests can exploit a DMOP mapping error on 86-based systems to cause denial of service conditions on the host system [CVE-2017-15591]. Systems using stub domains or other forms of disaggregation of control domains for HVM guests are affected. Versions 4.5 and after are affected.

A local user on an x86 HVM guest system can trigger a stack leak in the I/O operations to obtain potentially sensitive information from other guest systems or from the host system [CVE-2017-15589].

A local user on an x86 PV guest can trigger a pagetable recursion error to trigger a stack overflow and cause the host system hypervisor to crash. Versions 3.2 and after are affected. Prior versions may also be affected.

A local user on an x86 PV guest can trigger a race condition in processing Inter Processor Interrupts (IPIs) and cause a translation lookaside buffer (TLB) flush to fail to access all system memory on the host system. Versions 3.2 and later are affected [CVE-2017-15588]. Prior versions may also be affected.

A local user on an x86 PV guest can trigger a page type reference memory leak to consume excessive memory on the host system [CVE-2017-15593]. Versions 3.4 and after are affected.

A local user on an HVM guest can trigger a flaw in the processing of self-linear shadow pagetable mappings (for translated guests) to cause the host system hypervisor to crash [CVE-2017-15592].

A local user on an x86 PV guest can trigger a flaw in the processing of Interrupt Descriptor Table (IDT) values when a new CPU is hot-plugged to cause the host system hypervisor to crash [CVE-2017-15594]. Systems using AMD Secure Virtual Machine (SVM) extensions are affected. Versions 3.2 and after are affected. Prior versions may also be affected.

Simon Gaiser of Qubes OS Project, Vitaly Kuznetsov of RedHat, Roger Pau Monne of Citrix, Jann Horn of Google Project Zero, Jan Beulich of SUSE, and Andrew Cooper of Citrix reported these vulnerabilities.

Impact:   A local user on the guest system can gain elevated privileges on the host system.

A local user on the guest system can cause denial of service conditions on the host system.

A local user on the guest system can obtain potentially sensitive information from system memory on the host system.

A local user on the guest system can obtain potentially sensitive information from other guest systems or from the host system.

Solution:   The vendor has issued a fix.

The vendor advisories are available at:

https://xenbits.xen.org/xsa/advisory-237.html
https://xenbits.xen.org/xsa/advisory-238.html
https://xenbits.xen.org/xsa/advisory-239.html
https://xenbits.xen.org/xsa/advisory-240.html
https://xenbits.xen.org/xsa/advisory-241.html
https://xenbits.xen.org/xsa/advisory-242.html
https://xenbits.xen.org/xsa/advisory-243.html
https://xenbits.xen.org/xsa/advisory-244.html

Vendor URL:  xenbits.xen.org/xsa/advisory-237.html (Links to External Site)
Cause:   Access control error, Boundary error, Resource error, State error
Underlying OS:  Linux (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Dec 6 2017 (Citrix Issues Fix for Citrix XenServer) Xen Multiple Flaws on x86 Systems Let Local Guest System Users Obtain Memory Contents and Potentially Sensitive Information, Deny Service on the Host System, and Gain Elevated Privileges on the Host System
Citrix has issued a fix for Citrix XenServer.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC