Vulnerability Details : CVE-2017-12855
Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances, Xen will clear the status bits too early, incorrectly informing the guest that the grant is no longer in use. A guest may prematurely believe that a granted frame is safely private again, and reuse it in a way which contains sensitive information, while the domain on the far end of the grant is still using the grant. Xen 4.9, 4.8, 4.7, 4.6, and 4.5 are affected.
Vulnerability category: Information leak
Products affected by CVE-2017-12855
- cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.8.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.7.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.8.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.7.3:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.7.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-12855
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-12855
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
2.0
|
4.0
|
NIST |
CWE ids for CVE-2017-12855
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-12855
-
http://www.debian.org/security/2017/dsa-3969
Debian -- Security Information -- DSA-3969-1 xen
-
http://www.securitytracker.com/id/1039177
Xen Premature GTF Bit Clearing Lets Local Users on a Guet System Obtain Potentially Sensitive Information From Other Guest Systems - SecurityTrackerThird Party Advisory;VDB Entry
-
http://xenbits.xen.org/xsa/advisory-230.html
XSA-230 - Xen Security AdvisoriesVendor Advisory
-
http://www.securityfocus.com/bid/100341
Xen CVE-2017-12855 Local Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
https://support.citrix.com/article/CTX225941
Citrix XenServer Multiple Security Updates
Jump to