Vulnerability Details : CVE-2016-7777
Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
Products affected by CVE-2016-7777
- cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-7777
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7777
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:L/AC:M/Au:N/C:P/I:P/A:N |
3.4
|
4.9
|
NIST | |
6.3
|
MEDIUM | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N |
1.0
|
5.2
|
NIST |
CWE ids for CVE-2016-7777
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7777
-
https://support.citrix.com/article/CTX217363
Citrix XenServer Security Update for CVE-2016-7777
-
http://www.securityfocus.com/bid/93344
Xen CVE-2016-7777 Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://security.gentoo.org/glsa/201611-09
Xen: Multiple vulnerabilities (GLSA 201611-09) — Gentoo security
-
http://xenbits.xen.org/xsa/advisory-190.html
XSA-190 - Xen Security AdvisoriesMitigation;Patch;Vendor Advisory
-
http://www.securitytracker.com/id/1036942
Xen Control Register Access Race Condition Lets Local Users on a Guest System Read or Modify Register State Data for Other Processes on the Guest System - SecurityTrackerThird Party Advisory;VDB Entry
Jump to