Lucene search

K
cve[email protected]CVE-2016-9381
HistoryJan 23, 2017 - 9:59 p.m.

CVE-2016-9381

2017-01-2321:59:02
CWE-362
web.nvd.nist.gov
52
cve-2016-9381
race condition
xen
qemu
double fetch vulnerability
privilege escalation

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.9%

Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a “double fetch” vulnerability.

Affected configurations

NVD
Node
qemuqemuRange2.7.1
OR
qemuqemuMatch2.8.0rc0
Node
citrixxenserverMatch6.0.2
OR
citrixxenserverMatch6.2.0
OR
citrixxenserverMatch6.5
OR
citrixxenserverMatch7.0
CPENameOperatorVersion
qemu:qemuqemule2.7.1
qemu:qemuqemueq2.8.0

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.9%