CVE-2016-9385

EUVD-2016-10195
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
Affected Products (NVD)
VendorProductVersion
xenxen
4.4.0
xenxen
4.4.1
xenxen
4.4.2
xenxen
4.4.3
xenxen
4.4.4
xenxen
4.5.0
xenxen
4.5.1
xenxen
4.5.2
xenxen
4.5.3
xenxen
4.5.5
xenxen
4.6.0
xenxen
4.6.1
xenxen
4.6.3
xenxen
4.6.4
xenxen
4.7.0
xenxen
4.7.1
citrixxenserver
6.0.2
citrixxenserver
6.2.0
citrixxenserver
6.5
citrixxenserver
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xen
bookworm
4.17.3+10-g091466ba55-1~deb12u1
fixed
bullseye
4.14.6-1
fixed
bullseye (security)
4.14.5+94-ge49571868d-1
fixed
sid
4.17.3+36-g54dacb5c02-1
fixed
trixie
4.17.3+36-g54dacb5c02-1
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xen
precise
not-affected
trusty
Fixed 4.4.2-0ubuntu0.14.04.9
released
xenial
Fixed 4.6.0-1ubuntu4.3
released
yakkety
Fixed 4.7.0-0ubuntu2.1
released
zesty
Fixed 4.8.0-1ubuntu1
released