Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/94474 | vdb entry third party advisory |
https://security.gentoo.org/glsa/201612-56 | vendor advisory |
http://xenbits.xen.org/xsa/advisory-195.html | patch vendor advisory |
http://www.securitytracker.com/id/1037346 | vdb entry third party advisory |
https://support.citrix.com/article/CTX218775 | third party advisory patch |