Vulnerability Details : CVE-2017-7995
Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2017-7995
Probability of exploitation activity in the next 30 days: 0.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 26 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-7995
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
1.7
|
LOW | AV:L/AC:L/Au:S/C:P/I:N/A:N |
3.1
|
2.9
|
NIST |
3.8
|
LOW | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N |
2.0
|
1.4
|
NIST |
CWE ids for CVE-2017-7995
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-7995
-
http://www.securityfocus.com/bid/98314
Xen CVE-2017-7995 Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html
[security-announce] SUSE-SU-2017:1146-1: important: Security update forThird Party Advisory
-
https://bugzilla.suse.com/show_bug.cgi?id=1033948
Bug 1033948 – VUL-0: CVE-2017-7995: xen: access-before-verification vulnerability in old XenIssue Tracking;Third Party Advisory;VDB Entry
Products affected by CVE-2017-7995
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*
- cpe:2.3:o:novell:suse_linux_enterprise_point_of_sale:11.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*