Vulnerabilities > XEN > XEN > 4.6.3

DATE CVE VULNERABILITY TITLE RISK
2017-01-23 CVE-2016-9385 Improper Input Validation vulnerability in multiple products
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
local
low complexity
xen citrix CWE-20
4.9
2017-01-23 CVE-2016-9382 Permissions, Privileges, and Access Controls vulnerability in multiple products
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
local
low complexity
xen citrix CWE-264
4.6
2016-10-07 CVE-2016-7777 Race Condition vulnerability in XEN
Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
local
xen CWE-362
3.3
2016-09-21 CVE-2016-7094 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in XEN
Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.
local
xen CWE-119
1.5
2016-09-21 CVE-2016-7093 Permissions, Privileges, and Access Controls vulnerability in XEN 4.5.3/4.6.3/4.7.0
Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
local
low complexity
xen CWE-264
7.2
2016-08-02 CVE-2016-6259 Improper Input Validation vulnerability in multiple products
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
local
low complexity
xen citrix CWE-20
4.9
2016-08-02 CVE-2016-6258 Improper Access Control vulnerability in multiple products
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
local
low complexity
xen citrix CWE-284
7.2