CVE-2017-15595

HIGH

Xen < 4.9.0 - Denial of Service

Title source: rule
STIX 2.1

Description

An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Google Security Research · textdoslinux
https://www.exploit-db.com/exploits/43014

References (7)

Core 7
Core References
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
Mitigation, Patch, Vendor Advisory x_refsource_confirm
https://xenbits.xen.org/xsa/advisory-240.html
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2017/dsa-4050
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/43014/
Vendor Advisory x_refsource_confirm
https://support.citrix.com/article/CTX228867
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201801-14

Scores

CVSS v3 8.8
EPSS 0.0046
EPSS Percentile 64.2%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Details

CWE
CWE-400
Status published
Products (1)
xen/xen < 4.9.0
Published Oct 18, 2017
Tracked Since Feb 18, 2026