The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/94471 | vdb entry third party advisory |
https://security.gentoo.org/glsa/201612-56 | vendor advisory |
https://support.citrix.com/article/CTX218775 | third party advisory patch |
http://xenbits.xen.org/xsa/advisory-191.html | patch vendor advisory |
http://www.securitytracker.com/id/1037340 | vdb entry third party advisory |