CVE-2017-7995
low-risk
Published 2017-05-03
Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.
Do I need to act?
-
0.10% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.8/10
Low
LOCAL
/ LOW complexity
Affected Products (6)
References (6)
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html
Third Party Advisory
http://www.securityfocus.com/bid/98314
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1033948
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html
Third Party Advisory
http://www.securityfocus.com/bid/98314
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1033948
27
/ 100
low-risk
Severity
14/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
13/34 · Low