#VU7953 Privilege escalation in Xen - CVE-2017-12855
Published: August 16, 2017
Vulnerability identifier: #VU7953
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-12855
CWE-ID: CWE-264
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vulnerable software:
Xen
Xen
Software vendor:
Xen Project
Xen Project
Description
The vulnerability allows a local attacker on the guest system to gain elevated privileges on the host system.
The weakness exists due to flaws when clearing grant status bits. A local attacker on a guest system may modify or reuse a grant that is still in use by another domain and obtain potentially sensitive information from another guest on the target system.
a flaw when clearing grant status bits prematurely. As a result, a guest system may modify or reuse a grant that is still in use by another domain. A local attacker on a guest system may modify or reuse a grant that is still in use by another domain and obtain potentially sensitive information from another guest on the target system.
The weakness exists due to flaws when clearing grant status bits. A local attacker on a guest system may modify or reuse a grant that is still in use by another domain and obtain potentially sensitive information from another guest on the target system.
a flaw when clearing grant status bits prematurely. As a result, a guest system may modify or reuse a grant that is still in use by another domain. A local attacker on a guest system may modify or reuse a grant that is still in use by another domain and obtain potentially sensitive information from another guest on the target system.
Remediation
Install update from vendor's website.