Description
An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · textdoslinux
https://www.exploit-db.com/exploits/43014
References (7)
Core 7
Core References
Mailing List mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
Mitigation, Patch, Vendor Advisory x_refsource_confirm
https://xenbits.xen.org/xsa/advisory-240.html
Mailing List mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2017/dsa-4050
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/43014/
Vendor Advisory x_refsource_confirm
https://support.citrix.com/article/CTX228867
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201801-14
Scores
CVSS v3
8.8
EPSS
0.0046
EPSS Percentile
64.2%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-400
Status
published
Products (1)
xen/xen
< 4.9.0
Published
Oct 18, 2017
Tracked Since
Feb 18, 2026