CVE-2016-2271

Loading...

General

Score:2.1/10.0
Severity:Low
Category:N/A

Impact Metrics

Confidentiality:None
Integrity:None
Availability:Partial

Exploitability Metrics

Access Vector:Local
Access Complexity:Low
Authentication:None

Relative vulnerabilities

CVE-2013-4527, CVE-2013-4529, CVE-2013-4530, CVE-2013-4533, CVE-2013-4534, CVE-2013-4537, CVE-2013-4538, CVE-2013-4539, CVE-2014-0222, CVE-2014-3640, CVE-2014-3689, CVE-2014-7815, CVE-2014-9718, CVE-2015-1779, CVE-2015-2752, CVE-2015-2756, CVE-2015-5165, CVE-2015-5278, CVE-2015-5307, CVE-2015-6855, CVE-2015-7512, CVE-2015-7549, CVE-2015-7969, CVE-2015-7970, CVE-2015-7971, CVE-2015-7972, CVE-2015-8104, CVE-2015-8339, CVE-2015-8340, CVE-2015-8341, CVE-2015-8345, CVE-2015-8504, CVE-2015-8550, CVE-2015-8554, CVE-2015-8555, CVE-2015-8558, CVE-2015-8567, CVE-2015-8568, CVE-2015-8613, CVE-2015-8615, CVE-2015-8619, CVE-2015-8743, CVE-2015-8744, CVE-2015-8745, CVE-2015-8817, CVE-2015-8818, CVE-2016-1568, CVE-2016-1570, CVE-2016-1571, CVE-2016-1714, CVE-2016-1922, CVE-2016-1981, CVE-2016-2198, CVE-2016-2270, CVE-2016-2391, CVE-2016-2392, CVE-2016-2538, CVE-2016-2841

Published on 19/02/16 - Updated on 01/07/17

Description

VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.

Category:

There is insufficient information about the issue to classify it; details are unknown or unspecified.

Security Notices

US National Vulnerability DatabaseCVE-2016-2271
Agence Nationale de la Sécurité des Systèmes d'Information CERTFR-2016-AVI-133
Debian DSA-3519-1
Debian LTSDLA-479-1
Renater 2016/VULN062
SUSE SUSE-SU-2016:0873, SUSE-SU-2016:0955, SUSE-SU-2016:1154, SUSE-SU-2016:1318, SUSE-SU-2016:1445, SUSE-SU-2016:1745

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
xenxen

Share this vulnerability with:

Twitter Facebook LinkedIn Mail