CVE-2016-3159

Published on: 04/13/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:03 PM UTC

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

Certain versions of Debian Linux from Debian contain the following vulnerability:

The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.

  • CVE-2016-3159 has been assigned by [email protected] to track the vulnerability - currently rated as LOW severity.

CVSS3 Score: 3.8 - LOW

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED LOW NONE NONE

CVSS2 Score: 1.7 - LOW

Access
Vector
Access
Complexity
Authentication
LOCAL LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
[SECURITY] Fedora 23 Update: xen-4.5.3-1.fc23 Mailing List
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-e5432ca977
XSA-172 - Xen Security Advisories Patch
Vendor Advisory
xenbits.xen.org
text/html
URL Logo CONFIRM xenbits.xen.org/xsa/advisory-172.html
Xen CVE-2016-3159 Information Disclosure Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 85716
[SECURITY] Fedora 22 Update: xen-4.5.3-1.fc22 Mailing List
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-5f196e4e4a
Oracle VM Server for x86 Bulletin - July 2016 Third Party Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Citrix XenServer Multiple Security Updates Third Party Advisory
support.citrix.com
text/html
URL Logo CONFIRM support.citrix.com/article/CTX209443
Patch
Vendor Advisory
xenbits.xen.org
text/x-diff
CONFIRM xenbits.xen.org/xsa/xsa172.patch
Debian -- Security Information -- DSA-3554-1 xen Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3554
Xen Lets Local Users on a Guest System Obtain Register Contents from the Target Guest System - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1035435

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
FedoraprojectFedora22AllAllAll
Operating
System
FedoraprojectFedora23AllAllAll
Operating
System
FedoraprojectFedora22AllAllAll
Operating
System
FedoraprojectFedora23AllAllAll
Operating
System
OracleVm Server3.3AllAllAll
Operating
System
OracleVm Server3.4AllAllAll
Operating
System
OracleVm Server3.3AllAllAll
Operating
System
OracleVm Server3.4AllAllAll
Operating
System
XenXenAllAllAllAll
Operating
System
XenXenAllAllAllAll
Operating
System
XenXenAllAllAllAll
Operating
System
XenXenAllAllAllAll
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*: