SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Citrix XenServer Vendors:   Citrix
(Citrix Issues Fix for Citrix XenServer) Xen Multiple Flaws on x86 Systems Let Local Guest System Users Obtain Memory Contents and Potentially Sensitive Information, Deny Service on the Host System, and Gain Elevated Privileges on the Host System
SecurityTracker Alert ID:  1039965
SecurityTracker URL:  http://securitytracker.com/id/1039965
CVE Reference:   CVE-2017-15592   (Links to External Site)
Date:  Dec 6 2017
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.0.2, 6.2.0, 6.5, 7.0, 7.1, 7.2, 7.11
Description:   Several vulnerabilities were reported in Xen. A local user on the guest system can cause denial of service conditions on the host system. A local user on the guest system can gain elevated privileges on the host system. A local user can obtain potentially sensitive information from system memory. Citrix XenServer is affected.

A local user on a guest system that has a physical device assigned can exploit several PCI MSI interrupt flaws on x86-based systems to cause the host system to crash [CVE-2017-15590]. Versions 3.3 and after are affected.

A local user on a domain that controls HVM guests can exploit a DMOP mapping error on 86-based systems to cause denial of service conditions on the host system [CVE-2017-15591]. Systems using stub domains or other forms of disaggregation of control domains for HVM guests are affected. Versions 4.5 and after are affected.

A local user on an x86 HVM guest system can trigger a stack leak in the I/O operations to obtain potentially sensitive information from other guest systems or from the host system [CVE-2017-15589].

A local user on an x86 PV guest can trigger a pagetable recursion error to trigger a stack overflow and cause the host system hypervisor to crash. Versions 3.2 and after are affected. Prior versions may also be affected.

A local user on an x86 PV guest can trigger a race condition in processing Inter Processor Interrupts (IPIs) and cause a translation lookaside buffer (TLB) flush to fail to access all system memory on the host system. Versions 3.2 and later are affected [CVE-2017-15588]. Prior versions may also be affected.

A local user on an x86 PV guest can trigger a page type reference memory leak to consume excessive memory on the host system [CVE-2017-15593]. Versions 3.4 and after are affected.

A local user on an HVM guest can trigger a flaw in the processing of self-linear shadow pagetable mappings (for translated guests) to cause the host system hypervisor to crash [CVE-2017-15592].

A local user on an x86 PV guest can trigger a flaw in the processing of Interrupt Descriptor Table (IDT) values when a new CPU is hot-plugged to cause the host system hypervisor to crash [CVE-2017-15594]. Systems using AMD Secure Virtual Machine (SVM) extensions are affected. Versions 3.2 and after are affected. Prior versions may also be affected.

Simon Gaiser of Qubes OS Project, Vitaly Kuznetsov of RedHat, Roger Pau Monne of Citrix, Jann Horn of Google Project Zero, Jan Beulich of SUSE, and Andrew Cooper of Citrix reported these vulnerabilities.

Impact:   A local user on the guest system can gain elevated privileges on the host system.

A local user on the guest system can cause denial of service conditions on the host system.

A local user on the guest system can obtain potentially sensitive information from system memory on the host system.

A local user on the guest system can obtain potentially sensitive information from other guest systems or from the host system.

Solution:   Citrix has issued a fix for CVE-2017-15592 for Citrix XenServer.

7.2: CTX229541 and CTX230161

7.1 LTSR CU1: CTX229540 and CTX230160

7.1 LTSR: CTX229545 and CTX230159

7.0: CTX229539 and CTX229544

6.5 SP1: CTX229543

6.2 SP1: CTX229096

6.0.2 Common Criteria: CTX229095

The Citrix advisory is available at:

https://support.citrix.com/article/CTX230138

Vendor URL:  support.citrix.com/article/CTX230138 (Links to External Site)
Cause:   Access control error, Boundary error, Resource error, State error

Message History:   This archive entry is a follow-up to the message listed below.
Oct 12 2017 Xen Multiple Flaws on x86 Systems Let Local Guest System Users Obtain Memory Contents and Potentially Sensitive Information, Deny Service on the Host System, and Gain Elevated Privileges on the Host System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC