CVE-2016-6259

Published on: 08/02/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:12 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Xenserver from Citrix contain the following vulnerability:

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

  • CVE-2016-6259 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 6.2 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 4.9 - MEDIUM

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE COMPLETE

CVE References

Description Tags Link
Mitigation
Patch
xenbits.xen.org
text/x-diff
CONFIRM xenbits.xen.org/xsa/xsa183-4.6.patch
Citrix XenServer Multiple Security Updates Vendor Advisory
support.citrix.com
text/html
URL Logo CONFIRM support.citrix.com/article/CTX214954
Xen CVE-2016-6259 Denial of Service Vulnerability Third Party Advisory
cve.report (archive)
text/html
URL Logo BID 92130
XSA-183 - Xen Security Advisories Mailing List
Patch
xenbits.xen.org
text/html
URL Logo CONFIRM xenbits.xen.org/xsa/advisory-183.html
Xen SMAP Safety Check Whitelist Error Lets Local Users on a Guest System Cause Denial of Service Conditions on the Host System - SecurityTracker Third Party Advisory
www.securitytracker.com
text/html
URL Logo SECTRACK 1036447
Mitigation
Patch
xenbits.xen.org
text/x-diff
CONFIRM xenbits.xen.org/xsa/xsa183-unstable.patch

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCitrixXenserver6.0AllAllAll
ApplicationCitrixXenserver6.0.2AllAllAll
ApplicationCitrixXenserver6.1AllAllAll
ApplicationCitrixXenserver6.2.0sp1AllAll
ApplicationCitrixXenserver6.5.0sp1AllAll
ApplicationCitrixXenserver7.0AllAllAll
ApplicationCitrixXenserver6.0AllAllAll
ApplicationCitrixXenserver6.0.2AllAllAll
ApplicationCitrixXenserver6.1AllAllAll
ApplicationCitrixXenserver6.2.0sp1AllAll
ApplicationCitrixXenserver6.5.0sp1AllAll
ApplicationCitrixXenserver7.0AllAllAll
Operating
System
XenXen4.5.0AllAllAll
Operating
System
XenXen4.5.1AllAllAll
Operating
System
XenXen4.5.2AllAllAll
Operating
System
XenXen4.5.3AllAllAll
Operating
System
XenXen4.6.0AllAllAll
Operating
System
XenXen4.6.1AllAllAll
Operating
System
XenXen4.6.3AllAllAll
Operating
System
XenXen4.7.0AllAllAll
Operating
System
XenXen4.5.0AllAllAll
Operating
System
XenXen4.5.1AllAllAll
Operating
System
XenXen4.5.2AllAllAll
Operating
System
XenXen4.5.3AllAllAll
Operating
System
XenXen4.6.0AllAllAll
Operating
System
XenXen4.6.1AllAllAll
Operating
System
XenXen4.6.3AllAllAll
Operating
System
XenXen4.7.0AllAllAll
  • cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*: