Vulnerability Details : CVE-2017-10923
Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2017-10923
- cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.8.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.7.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.8.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-10923
0.78%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-10923
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2017-10923
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-10923
-
http://www.securitytracker.com/id/1038735
Xen ARM Generic Interrupt Controller Array Access Error Lets Local Users on a Guest System Cause Denial of Service Conditions on the Host System - SecurityTrackerThird Party Advisory;VDB Entry
-
https://security.gentoo.org/glsa/201708-03
Gentoo Linux — Error 404 (Not Found)
-
http://www.securityfocus.com/bid/99160
Xen 'xen/arch/arm/vgic.c' Denial of Service VulnerabilityTool Signature;VDB Entry
-
https://xenbits.xen.org/xsa/advisory-225.html
XSA-225 - Xen Security AdvisoriesMailing List;Mitigation;Vendor Advisory
Jump to