{"api_version":"1","generated_at":"2026-04-22T23:20:04+00:00","cve":"CVE-2017-7995","urls":{"html":"https://cve.report/CVE-2017-7995","api":"https://cve.report/api/cve/CVE-2017-7995.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-7995","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-7995"},"summary":{"title":"CVE-2017-7995","description":"Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2017-05-03 19:59:00","updated_at":"2017-05-15 17:45:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1033948","name":"https://bugzilla.suse.com/show_bug.cgi?id=1033948","refsource":"CONFIRM","tags":["Issue Tracking","Third Party Advisory","VDB Entry"],"title":"Bug 1033948 – VUL-0: CVE-2017-7995: xen: access-before-verification vulnerability in old Xen","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/98314","name":"98314","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Xen CVE-2017-7995 Information Disclosure Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html","name":"http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2017:1146-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-7995","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7995","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_point_of_sale","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_point_of_sale","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_server","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_server","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_proxy","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_proxy","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"openstack_cloud","cpe6":"5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"openstack_cloud","cpe6":"5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"7995","vulnerable":"1","versionEndIncluding":"4.2.5","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"xen","cpe5":"xen","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2017-7995","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"98314","refsource":"BID","url":"http://www.securityfocus.com/bid/98314"},{"name":"https://bugzilla.suse.com/show_bug.cgi?id=1033948","refsource":"CONFIRM","url":"https://bugzilla.suse.com/show_bug.cgi?id=1033948"},{"name":"http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html","refsource":"CONFIRM","url":"http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html"}]}},"nvd":{"publishedDate":"2017-05-03 19:59:00","lastModifiedDate":"2017-05-15 17:45:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":3.8,"baseSeverity":"LOW"},"exploitabilityScore":2,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:S/C:P/I:N/A:N","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":1.7},"severity":"LOW","exploitabilityScore":3.1,"impactScore":2.9,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.5","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:novell:suse_linux_enterprise_point_of_sale:11.0:sp3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"7995","Ordinal":"104882","Title":"CVE-2017-7995","CVE":"CVE-2017-7995","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"7995","Ordinal":"1","NoteData":"Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"7995","Ordinal":"2","NoteData":"2017-05-03","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"7995","Ordinal":"3","NoteData":"2017-05-08","Type":"Other","Title":"Modified"}]}}}