cvelist/2016/7xxx/CVE-2016-7093.json

87 lines
2.8 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 22:49:38 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-7093",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 22:49:38 +00:00
"lang": "eng",
"value": "Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation."
2017-10-16 12:31:07 -04:00
}
2019-03-17 22:49:38 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://xenbits.xen.org/xsa/advisory-186.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-186.html"
},
{
"name": "92865",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92865"
},
{
"name": "http://xenbits.xen.org/xsa/xsa186-0001-x86-emulate-Correct-boundary-interactions-of-emulate.patch",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/xsa186-0001-x86-emulate-Correct-boundary-interactions-of-emulate.patch"
},
{
"name": "http://support.citrix.com/article/CTX216071",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX216071"
},
{
"name": "1036752",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036752"
},
{
"name": "GLSA-201611-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201611-09"
}
]
}
}