CVE-2016-4962

Published on: 06/07/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:59 PM UTC

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Certain versions of Vm Server from Oracle contain the following vulnerability:

The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.

  • CVE-2016-4962 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 6.7 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW HIGH NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
LOCAL LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
XSA-175 - Xen Security Advisories Vendor Advisory
xenbits.xen.org
text/html
URL Logo CONFIRM xenbits.xen.org/xsa/advisory-175.html
Xen Input Validation Flaw in libxl Lets Local Guest Users Deny Service and Gain Elevated Privileges on the Host System - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1036023
Xen CVE-2016-4962 Privilege Escalation Vulnerability cve.report (archive)
text/html
URL Logo BID 91006
Oracle VM Server for x86 Bulletin - July 2016 Vendor Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Debian -- Security Information -- DSA-3633-1 xen www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3633

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
OracleVm Server3.3AllAllAll
Operating
System
OracleVm Server3.4AllAllAll
Operating
System
OracleVm Server3.3AllAllAll
Operating
System
OracleVm Server3.4AllAllAll
Operating
System
XenXen4.3.0AllAllAll
Operating
System
XenXen4.3.1AllAllAll
Operating
System
XenXen4.3.2AllAllAll
Operating
System
XenXen4.3.3AllAllAll
Operating
System
XenXen4.3.4AllAllAll
Operating
System
XenXen4.4.0AllAllAll
Operating
System
XenXen4.4.0rc1AllAll
Operating
System
XenXen4.4.1AllAllAll
Operating
System
XenXen4.4.2AllAllAll
Operating
System
XenXen4.4.3AllAllAll
Operating
System
XenXen4.4.4AllAllAll
Operating
System
XenXen4.5.0AllAllAll
Operating
System
XenXen4.5.1AllAllAll
Operating
System
XenXen4.5.2AllAllAll
Operating
System
XenXen4.5.3AllAllAll
Operating
System
XenXen4.6.0AllAllAll
Operating
System
XenXen4.6.1AllAllAll
Operating
System
XenXen4.3.0AllAllAll
Operating
System
XenXen4.3.1AllAllAll
Operating
System
XenXen4.3.2AllAllAll
Operating
System
XenXen4.3.3AllAllAll
Operating
System
XenXen4.3.4AllAllAll
Operating
System
XenXen4.4.0AllAllAll
Operating
System
XenXen4.4.0rc1AllAll
Operating
System
XenXen4.4.1AllAllAll
Operating
System
XenXen4.4.2AllAllAll
Operating
System
XenXen4.4.3AllAllAll
Operating
System
XenXen4.4.4AllAllAll
Operating
System
XenXen4.5.0AllAllAll
Operating
System
XenXen4.5.1AllAllAll
Operating
System
XenXen4.5.2AllAllAll
Operating
System
XenXen4.5.3AllAllAll
Operating
System
XenXen4.6.0AllAllAll
Operating
System
XenXen4.6.1AllAllAll
  • cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*: