Improper input validation in Xen - CVE-2017-15591
Published: October 16, 2017 / Updated: July 28, 2020
Vulnerability identifier: #VU8833
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-15591
CWE-ID: CWE-20
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vendor: Xen Project
Affected software:
Xen
Xen
Detailed vulnerability description
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.
The weakness exists in x86 systems due to improper request processing. An adjacent attacker can use a domain that controls a guest system and cause the system to crash.
Successful exploitation of the vulnerability may result in denial of service.
The weakness exists in x86 systems due to improper request processing. An adjacent attacker can use a domain that controls a guest system and cause the system to crash.
Successful exploitation of the vulnerability may result in denial of service.
How to mitigate CVE-2017-15591
Install update from vendor's website.