Improper input validation in Xen - CVE-2017-15591

 

Improper input validation in Xen - CVE-2017-15591

Published: October 16, 2017 / Updated: July 28, 2020


Vulnerability identifier: #VU8833
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-15591
CWE-ID: CWE-20
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Xen Project
Affected software:
Xen

Detailed vulnerability description

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The weakness exists in x86 systems due to improper request processing. An adjacent attacker can use a domain that controls a guest system and cause the system to crash.

Successful exploitation of the vulnerability may result in denial of service.

How to mitigate CVE-2017-15591

Install update from vendor's website.

Sources