Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2017-10917
HistoryJul 05, 2017 - 1:29 a.m.

CVE-2017-10917

2017-07-0501:29:00
Debian Security Bug Tracker
security-tracker.debian.org
15

9.4 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:N/A:C

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

0.005 Low

EPSS

Percentile

75.7%

Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.8.1-1+deb9u3xen_4.8.1-1+deb9u3_all.deb
Debian11allxen< 4.8.1-1+deb9u3xen_4.8.1-1+deb9u3_all.deb
Debian999allxen< 4.8.1-1+deb9u3xen_4.8.1-1+deb9u3_all.deb
Debian13allxen< 4.8.1-1+deb9u3xen_4.8.1-1+deb9u3_all.deb

9.4 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:N/A:C

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

0.005 Low

EPSS

Percentile

75.7%